USN-5402-2: OpenSSL vulnerabilities
26 May 2022
Several security issues were fixed in OpenSSL.
Releases
Packages
- openssl - Secure Socket Layer (SSL) cryptographic library and tools
Details
USN-5402-1 fixed several vulnerabilities in OpenSSL. This update provides
the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:
Elison Niven discovered that OpenSSL incorrectly handled the c_rehash
script. A local attacker could possibly use this issue to execute arbitrary
commands when c_rehash is run. (CVE-2022-1292)
Aliaksei Levin discovered that OpenSSL incorrectly handled resources when
decoding certificates and keys. A remote attacker could possibly use this
issue to cause OpenSSL to consume resources, leading to a denial of
service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1473)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
libssl1.0.0
-
1.0.2g-1ubuntu4.20+esm3
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-5402-1: libssl3, libssl-doc, libssl1.0.0, libssl1.1, libssl1.0-dev, openssl1.0, libssl-dev, openssl
- USN-6457-1: libnode-dev, nodejs-doc, nodejs, libnode72
- USN-7018-1: libssl-dev, libssl-doc, openssl, libssl1.0.0
- USN-7060-1: qemu-efi, ovmf-ia32, edk2, ovmf, qemu-efi-arm, qemu-efi-aarch64