[USN-6188-1] OpenSSL vulnerability
Severity
Medium
Affected Packages
8
CVEs
1
OpenSSL could be made to consume resources and cause long delays if it processed certain input.
Matt Caswell discovered that OpenSSL incorrectly handled certain ASN.1
object identifiers. A remote attacker could possibly use this issue to
cause OpenSSL to consume resources, resulting in a denial of service.
Package | Affected Version |
---|---|
pkg:deb/ubuntu/openssl?distro=xenial | < 1.0.2g-1ubuntu4.20+esm9 |
pkg:deb/ubuntu/openssl?distro=trusty | < 1.0.1f-1ubuntu2.27+esm9 |
pkg:deb/ubuntu/libssl1.0.0?distro=xenial | < 1.0.2g-1ubuntu4.20+esm9 |
pkg:deb/ubuntu/libssl1.0.0?distro=trusty | < 1.0.1f-1ubuntu2.27+esm9 |
pkg:deb/ubuntu/libssl-doc?distro=xenial | < 1.0.2g-1ubuntu4.20+esm9 |
pkg:deb/ubuntu/libssl-doc?distro=trusty | < 1.0.1f-1ubuntu2.27+esm9 |
pkg:deb/ubuntu/libssl-dev?distro=xenial | < 1.0.2g-1ubuntu4.20+esm9 |
pkg:deb/ubuntu/libssl-dev?distro=trusty | < 1.0.1f-1ubuntu2.27+esm9 |
- ID
- USN-6188-1
- Severity
- medium
- Severity from
- CVE-2023-2650
- URL
- https://ubuntu.com/security/notices/USN-6188-1
- Published
-
2023-06-22T14:53:11
(15 months ago) - Modified
-
2023-06-22T14:53:11
(15 months ago) - Other Advisories
-
- ALAS-2023-1762
- ALAS2-2023-2073
- ALAS2-2023-2097
- ALAS2-2024-2502
- ALPINE:CVE-2023-2650
- ALSA-2023:3722
- ALSA-2023:6330
- DSA-5417-1
- ELSA-2023-12768
- ELSA-2023-3722
- ELSA-2023-6330
- FEDORA-2023-026c8ba371
- FEDORA-2023-964eb00fc6
- FREEBSD:22DF5074-71CD-11EE-85EB-84A93843EB75
- FREEBSD:D86BECFE-05A4-11EE-9D4A-080027EDA32C
- FREEBSD:EB9A3C57-FF9E-11ED-A0D1-84A93843EB75
- GLSA-202402-08
- MS:CVE-2023-2650
- RHSA-2023:3722
- RHSA-2023:6330
- SSA:2023-150-01
- SUSE-SU-2023:2327-1
- SUSE-SU-2023:2328-1
- SUSE-SU-2023:2329-1
- SUSE-SU-2023:2330-1
- SUSE-SU-2023:2331-1
- SUSE-SU-2023:2332-1
- SUSE-SU-2023:2342-1
- SUSE-SU-2023:2343-1
- SUSE-SU-2023:2469-1
- SUSE-SU-2023:2470-1
- SUSE-SU-2023:2471-1
- SUSE-SU-2023:2620-1
- USN-6119-1
- USN-6672-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/openssl?distro=xenial | ubuntu | openssl | < 1.0.2g-1ubuntu4.20+esm9 | xenial | ||
Affected | pkg:deb/ubuntu/openssl?distro=trusty | ubuntu | openssl | < 1.0.1f-1ubuntu2.27+esm9 | trusty | ||
Affected | pkg:deb/ubuntu/libssl1.0.0?distro=xenial | ubuntu | libssl1.0.0 | < 1.0.2g-1ubuntu4.20+esm9 | xenial | ||
Affected | pkg:deb/ubuntu/libssl1.0.0?distro=trusty | ubuntu | libssl1.0.0 | < 1.0.1f-1ubuntu2.27+esm9 | trusty | ||
Affected | pkg:deb/ubuntu/libssl-doc?distro=xenial | ubuntu | libssl-doc | < 1.0.2g-1ubuntu4.20+esm9 | xenial | ||
Affected | pkg:deb/ubuntu/libssl-doc?distro=trusty | ubuntu | libssl-doc | < 1.0.1f-1ubuntu2.27+esm9 | trusty | ||
Affected | pkg:deb/ubuntu/libssl-dev?distro=xenial | ubuntu | libssl-dev | < 1.0.2g-1ubuntu4.20+esm9 | xenial | ||
Affected | pkg:deb/ubuntu/libssl-dev?distro=trusty | ubuntu | libssl-dev | < 1.0.1f-1ubuntu2.27+esm9 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |