First published: Tue Mar 15 2022(Updated: )
Tavis Ormandy discovered that OpenSSL incorrectly parsed certain certificates. A remote attacker could possibly use this issue to cause OpenSSH to stop responding, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssl1.1 | <1.1.1l-1ubuntu1.2 | 1.1.1l-1ubuntu1.2 |
=21.10 | ||
All of | ||
ubuntu/libssl1.1 | <1.1.1f-1ubuntu2.12 | 1.1.1f-1ubuntu2.12 |
=20.04 | ||
All of | ||
ubuntu/libssl1.0.0 | <1.0.2n-1ubuntu5.8 | 1.0.2n-1ubuntu5.8 |
=18.04 | ||
All of | ||
ubuntu/libssl1.1 | <1.1.1-1ubuntu2.1~18.04.15 | 1.1.1-1ubuntu2.1~18.04.15 |
=18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-0778.
A remote attacker could exploit this vulnerability by using specially crafted certificates to cause OpenSSH to stop responding, resulting in a denial of service.
The affected versions are libssl1.1 versions 1.1.1l-1ubuntu1.2, 1.1.1f-1ubuntu2.12, and 1.1.1-1ubuntu2.1~18.04.15.
The affected version is libssl1.0.0 version 1.0.2n-1ubuntu5.8.
To fix the vulnerability, you should update libssl1.1 to the recommended versions: 1.1.1l-1ubuntu1.2, 1.1.1f-1ubuntu2.12, or 1.1.1-1ubuntu2.1~18.04.15. Additionally, update libssl1.0.0 to version 1.0.2n-1ubuntu5.8.