-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmaqcMQACgkQZWnYVadE
vpM6pxAAksY+5dgbfNnbnGoHmwmbEin/Pqmk97nzjRSwEAH01VEwb0v8N6aC65+2
i0TrKMo/hlfg6JVUL3+zjW9X2MXzF2/LjIBnh0mr1IY9sOYc0ziV76lE0xEL+aL4
Xb/HYNJ/EnGP6PJWj9QTTNW1OPJtO527UfdElhIRQjNqcqDfGq7JOO/wMyzMAHN7
V3pAyHu0qZIME1F1NrlHKGh/qR0QRYmByVwVHcBXCTjo3WV/wKabcKPqC7HRnTUA
xgskhuaM6twYVmq2ALEwTbs/oqSODcGVP5YXLMmsRkqcohPTlTERFgGjUcoikv59
RnC99AUywwbBL6nRmx9G6vEfMRe2qlBmfr8Mct0T4uIYZWboG+5IpNr1iScw2USY
NxGOC+LgUIcQ1TxCXIADki6xr3sMymIUcJE9RCTW70TRX/ZaH53/EHLUhaF/dac6
eDzDBj9WhMtjqTbeAmly1YCN4gg2HMWX6EjCOBuCX6JvfnCsB7oeeesAb+Z1uQW7
PckJ6vYkRMP+g8TnSm/NmN3/DvccfHBVfAXNWMpjNd8UeuP7bRHYlHBtnt2tghbi
P2JoY23BKF2jLnCRa4UkhBOP4x010sfHiyvrSMRaBFNZ3b+8GW+q2oU9TECIJs6F
exah6Rclp2E1dSCC3XCXVy/GtUlIFikXi3Mfcy2PND8MAA1CMF8=
=t0is
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6937-1
July 31, 2024
openssl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in OpenSSL.
Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools
Details:
It was discovered that OpenSSL incorrectly handled TLSv1.3 sessions when
certain non-default TLS server configurations were in use. A remote
attacker could possibly use this issue to cause OpenSSL to consume
resources, leading to a denial of service. (CVE-2024-2511)
It was discovered that OpenSSL incorrectly handled checking excessively
long DSA keys or parameters. A remote attacker could possibly use this
issue to cause OpenSSL to consume resources, leading to a denial of
service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS.
(CVE-2024-4603)
William Ahern discovered that OpenSSL incorrectly handled certain memory
operations in a rarely-used API. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2024-4741)
Joseph Birr-Pixton discovered that OpenSSL incorrectly handled calling a
certain API with an empty supported client protocols buffer. A remote
attacker could possibly use this issue to obtain sensitive information, or
cause OpenSSL to crash, resulting in a denial of service. (CVE-2024-5535)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
libssl3t64 3.0.13-0ubuntu3.2
Ubuntu 22.04 LTS
libssl3 3.0.2-0ubuntu1.17
Ubuntu 20.04 LTS
libssl1.1 1.1.1f-1ubuntu2.23
After a standard system update you need to reboot your computer to make all
the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6937-1
CVE-2024-2511, CVE-2024-4603, CVE-2024-4741, CVE-2024-5535
Package Information:
https://launchpad.net/ubuntu/+source/openssl/3.0.13-0ubuntu3.2
https://launchpad.net/ubuntu/+source/openssl/3.0.2-0ubuntu1.17
https://launchpad.net/ubuntu/+source/openssl/1.1.1f-1ubuntu2.23
No comments:
Post a Comment