-
Notifications
You must be signed in to change notification settings - Fork 0
/
USN-6622-1.json
128 lines (128 loc) · 3.81 KB
/
USN-6622-1.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
{
"id": "USN-6622-1",
"summary": "openssl vulnerabilities",
"details": "David Benjamin discovered that OpenSSL incorrectly handled excessively long\nX9.42 DH keys. A remote attacker could possibly use this issue to cause\nOpenSSL to consume resources, leading to a denial of service.\n(CVE-2023-5678)\n\nSverker Eriksson discovered that OpenSSL incorrectly handled POLY1304 MAC\non the PowerPC architecture. A remote attacker could use this issue to\ncause OpenSSL to crash, resulting in a denial of service, or possibly\nexecute arbitrary code. This issue only affected Ubuntu 22.04 LTS and\nUbuntu 23.04. (CVE-2023-6129)\n\nIt was discovered that OpenSSL incorrectly handled excessively long RSA\npublic keys. A remote attacker could possibly use this issue to cause\nOpenSSL to consume resources, leading to a denial of service. This issue\nonly affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-6237)\n\nBahaa Naamneh discovered that OpenSSL incorrectly handled certain malformed\nPKCS12 files. A remote attacker could possibly use this issue to cause\nOpenSSL to crash, resulting in a denial of service. (CVE-2024-0727)\n",
"aliases": [],
"related": [
"CVE-2023-5678",
"CVE-2023-6129",
"CVE-2023-6237",
"CVE-2024-0727"
],
"published": "2024-02-05T12:18:56.110746Z",
"modified": "2024-02-05T12:18:56.110746Z",
"affected": [
{
"package": {
"ecosystem": "Ubuntu:20.04:LTS",
"name": "openssl"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.1.1f-1ubuntu2.21"
}
]
}
],
"ecosystem_specific": {
"binaries": [
{
"libssl-dev": "1.1.1f-1ubuntu2.21",
"libssl-doc": "1.1.1f-1ubuntu2.21",
"libssl1.1": "1.1.1f-1ubuntu2.21",
"openssl": "1.1.1f-1ubuntu2.21"
}
],
"availability": "No subscription needed"
}
},
{
"package": {
"ecosystem": "Ubuntu:22.04:LTS",
"name": "openssl"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.2-0ubuntu1.14"
}
]
}
],
"ecosystem_specific": {
"binaries": [
{
"libssl-dev": "3.0.2-0ubuntu1.14",
"libssl-doc": "3.0.2-0ubuntu1.14",
"libssl3": "3.0.2-0ubuntu1.14",
"openssl": "3.0.2-0ubuntu1.14"
}
],
"availability": "No subscription needed"
}
},
{
"package": {
"ecosystem": "Ubuntu:23.10",
"name": "openssl"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.10-1ubuntu2.2"
}
]
}
],
"ecosystem_specific": {
"binaries": [
{
"libssl-dev": "3.0.10-1ubuntu2.2",
"libssl-doc": "3.0.10-1ubuntu2.2",
"libssl3": "3.0.10-1ubuntu2.2",
"openssl": "3.0.10-1ubuntu2.2"
}
],
"availability": "No subscription needed"
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://ubuntu.com/security/notices/USN-6622-1"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2023-5678"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2023-6129"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2023-6237"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2024-0727"
}
]
}