USN-6709-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-6709-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-6709-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6709-1
Related
Published
2024-03-21T16:53:43.513007Z
Modified
2024-03-21T16:53:43.513007Z
Summary
openssl1.0 vulnerabilities
Details

It was discovered that checking excessively long DH keys or parameters may be very slow. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, resulting in a denial of service. (CVE-2023-3446)

After the fix for CVE-2023-3446 Bernd Edlinger discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, resulting in a denial of service. (CVE-2023-3817)

David Benjamin discovered that generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, resulting in a denial of service. (CVE-2023-5678)

Bahaa Naamneh discovered that processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack. (CVE-2024-0727)

References

Affected packages

Ubuntu:Pro:18.04:LTS / openssl1.0

Package

Name
openssl1.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2n-1ubuntu5.13+esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "libssl1.0-dev": "1.0.2n-1ubuntu5.13+esm1",
            "openssl1.0": "1.0.2n-1ubuntu5.13+esm1",
            "libssl1.0.0": "1.0.2n-1ubuntu5.13+esm1"
        }
    ]
}