First published: Tue Aug 24 2021(Updated: )
John Ouyang discovered that OpenSSL incorrectly handled decrypting SM2 data. A remote attacker could use this issue to cause applications using OpenSSL to crash, resulting in a denial of service, or possibly change application behaviour. (CVE-2021-3711) Ingo Schwarze discovered that OpenSSL incorrectly handled certain ASN.1 strings. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly obtain sensitive information. (CVE-2021-3712)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssl1.1 | <1.1.1j-1ubuntu3.5 | 1.1.1j-1ubuntu3.5 |
Ubuntu | =21.04 | |
All of | ||
ubuntu/libssl1.1 | <1.1.1f-1ubuntu2.8 | 1.1.1f-1ubuntu2.8 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libssl1.1 | <1.1.1-1ubuntu2.1~18.04.13 | 1.1.1-1ubuntu2.1~18.04.13 |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-5051-1 is considered high due to the potential for denial of service and application behavior changes.
To fix USN-5051-1, upgrade to the latest version of the libssl1.1 package specific to your Ubuntu version.
Applications using affected versions of OpenSSL are vulnerable to the issues described in USN-5051-1.
While USN-5051-1 can cause crashes and denial of service, it does not directly enable remote code execution.
John Ouyang and Ingo Schwarze are the researchers who discovered the vulnerabilities addressed in USN-5051-1.