Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-5402-1

Ubuntu Security Notice 5402-1 - Elison Niven discovered that OpenSSL incorrectly handled the c_rehash script. A local attacker could possibly use this issue to execute arbitrary commands when c_rehash is run. Raul Metsma discovered that OpenSSL incorrectly verified certain response signing certificates. A remote attacker could possibly use this issue to spoof certain response signing certificates. This issue only affected Ubuntu 22.04 LTS.

Packet Storm
#vulnerability#mac#ubuntu#ssl

==========================================================================
Ubuntu Security Notice USN-5402-1
May 04, 2022

openssl, openssl1.0 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 22.04 LTS
  • Ubuntu 21.10
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in OpenSSL.

Software Description:

  • openssl: Secure Socket Layer (SSL) cryptographic library and tools
  • openssl1.0: Secure Socket Layer (SSL) cryptographic library and tools

Details:

Elison Niven discovered that OpenSSL incorrectly handled the c_rehash
script. A local attacker could possibly use this issue to execute arbitrary
commands when c_rehash is run. (CVE-2022-1292)

Raul Metsma discovered that OpenSSL incorrectly verified certain response
signing certificates. A remote attacker could possibly use this issue to
spoof certain response signing certificates. This issue only affected
Ubuntu 22.04 LTS. (CVE-2022-1343)

Tom Colley discovered that OpenSSL used the incorrect MAC key in the
RC4-MD5 ciphersuite. In non-default configurations were RC4-MD5 is enabled,
a remote attacker could possibly use this issue to modify encrypted
communications. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1434)

Aliaksei Levin discovered that OpenSSL incorrectly handled resources when
decoding certificates and keys. A remote attacker could possibly use this
issue to cause OpenSSL to consume resources, leading to a denial of
service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1473)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
libssl3 3.0.2-0ubuntu1.1

Ubuntu 21.10:
libssl1.1 1.1.1l-1ubuntu1.3

Ubuntu 20.04 LTS:
libssl1.1 1.1.1f-1ubuntu2.13

Ubuntu 18.04 LTS:
libssl1.0.0 1.0.2n-1ubuntu5.9
libssl1.1 1.1.1-1ubuntu2.1~18.04.17

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5402-1
CVE-2022-1292, CVE-2022-1343, CVE-2022-1434, CVE-2022-1473

Package Information:
https://launchpad.net/ubuntu/+source/openssl/3.0.2-0ubuntu1.1
https://launchpad.net/ubuntu/+source/openssl/1.1.1l-1ubuntu1.3
https://launchpad.net/ubuntu/+source/openssl/1.1.1f-1ubuntu2.13
https://launchpad.net/ubuntu/+source/openssl/1.1.1-1ubuntu2.1~18.04.17
https://launchpad.net/ubuntu/+source/openssl1.0/1.0.2n-1ubuntu5.9

Packet Storm: Latest News

Grav CMS 1.7.44 Server-Side Template Injection