USN-5328-2: OpenSSL vulnerability
15 March 2022
OpenSSL could be made to stop responding if it opened a specially crafted certificate.
Releases
Packages
- openssl - Secure Socket Layer (SSL) cryptographic library and tools
Details
USN-5328-1 fixed a vulnerability in OpenSSL. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Tavis Ormandy discovered that OpenSSL incorrectly parsed certain
certificates. A remote attacker could possibly use this issue to cause
OpenSSH to stop responding, resulting in a denial of service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
libssl1.0.0
-
1.0.2g-1ubuntu4.20+esm2
Available with Ubuntu Pro
Ubuntu 14.04
-
libssl1.0.0
-
1.0.1f-1ubuntu2.27+esm5
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-5328-1: libssl1.0-dev, libssl-doc, openssl1.0, libssl1.0.0, libssl-dev, openssl, libssl1.1
- USN-6457-1: libnode-dev, nodejs, libnode72, nodejs-doc