CVE-2012-0027

Publication date 5 January 2012

Last updated 24 July 2024


Ubuntu priority

The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.

Read the notes from the security team

Status

Package Ubuntu Release Status
openssl 11.10 oneiric
Fixed 1.0.0e-2ubuntu4.2
11.04 natty
Not affected
10.10 maverick
Not affected
10.04 LTS lucid
Not affected
8.04 LTS hardy
Not affected
openssl098 11.10 oneiric
Not affected
11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid Not in release
8.04 LTS hardy Not in release

Notes


sbeattie

GOST is not in openssl 0.9.8

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
openssl

References

Related Ubuntu Security Notices (USN)

    • USN-1357-1
    • OpenSSL vulnerabilities
    • 9 February 2012

Other references