USN-6435-1: OpenSSL vulnerabilities
18 October 2023
OpenSSL could be made to consume resources and cause long delays if it processed certain input.
Releases
Packages
- openssl - Secure Socket Layer (SSL) cryptographic library and tools
Details
It was discovered that OpenSSL incorrectly handled excessively large
Diffie-Hellman parameters. An attacker could possibly use this issue
to cause a denial of service. (CVE-2023-3446)
Bernd Edlinger discovered that OpenSSL incorrectly handled excessively
large Diffie-Hellman parameters. An attacker could possibly use this
issue to cause a denial of service. (CVE-2023-3817)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
libssl1.1
-
1.1.1-1ubuntu2.1~18.04.23+esm3
Available with Ubuntu Pro
-
openssl
-
1.1.1-1ubuntu2.1~18.04.23+esm3
Available with Ubuntu Pro
Ubuntu 16.04
-
libssl1.0.0
-
1.0.2g-1ubuntu4.20+esm10
Available with Ubuntu Pro
-
openssl
-
1.0.2g-1ubuntu4.20+esm10
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-6450-1: libssl-doc, libssl3, openssl, libssl-dev
- USN-6435-2: libssl-doc, openssl, libssl1.1, libssl-dev
- USN-6709-1: openssl1.0, libssl1.0.0, libssl1.0-dev
- USN-7018-1: libssl-doc, libssl1.0.0, libssl-dev, openssl