Ubuntu alert USN-6435-2 (openssl)
From: | Ian Constantin <ian.constantin@canonical.com> | |
To: | ubuntu-security-announce@lists.ubuntu.com | |
Subject: | [USN-6435-2] OpenSSL vulnerabilities | |
Date: | Wed, 25 Oct 2023 17:00:01 +0300 | |
Message-ID: | <e7996b42-e194-43a3-bc1c-e3a7524edd82@canonical.com> |
========================================================================== Ubuntu Security Notice USN-6435-2 October 25, 2023 openssl vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: OpenSSL could be made to consume resources and cause long delays if it processed certain input. Software Description: - openssl: Secure Socket Layer (SSL) cryptographic library and tools Details: USN-6435-1 fixed vulnerabilities in OpenSSL. This update provides the corresponding updates for Ubuntu 20.04 LTS. Original advisory details: It was discovered that OpenSSL incorrectly handled excessively large Diffie-Hellman parameters. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-3446) Bernd Edlinger discovered that OpenSSL incorrectly handled excessively large Diffie-Hellman parameters. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-3817) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: libssl1.1 1.1.1f-1ubuntu2.20 openssl 1.1.1f-1ubuntu2.20 After a standard system update you need to reboot your computer to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6435-2 https://ubuntu.com/security/notices/USN-6435-1 CVE-2023-3446, CVE-2023-3817 Package Information: https://launchpad.net/ubuntu/+source/openssl/1.1.1f-1ubun...