First published: Tue Apr 17 2018(Updated: )
USN-3611-1 fixed a vulnerability in OpenSSL. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: It was discovered that OpenSSL incorrectly parsed the IPAddressFamily extension in X.509 certificates, resulting in an erroneous display of the certificate in text format. (CVE-2017-3735) It was discovered that OpenSSL incorrectly handled certain ASN.1 types. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2018-0739)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssl1.0.0 | <1.0.1-4ubuntu5.40 | 1.0.1-4ubuntu5.40 |
Ubuntu OpenSSH Client | =12.04 | |
All of | ||
ubuntu/openssl | <1.0.1-4ubuntu5.40 | 1.0.1-4ubuntu5.40 |
Ubuntu OpenSSH Client | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3611-2 is not specified.
To fix USN-3611-2, update the libssl1.0.0 and openssl packages to version 1.0.1-4ubuntu5.40 or later.
The affected software for USN-3611-2 is Ubuntu 12.04 ESM with libssl1.0.0 and openssl packages 1.0.1-4ubuntu5.40 or earlier.
The reference for USN-3611-2 is https://ubuntu.com/security/CVE-2017-3735 and https://ubuntu.com/security/CVE-2018-0739.