First published: Tue Mar 15 2022(Updated: )
USN-5328-1 fixed a vulnerability in OpenSSL. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Original advisory details: Tavis Ormandy discovered that OpenSSL incorrectly parsed certain certificates. A remote attacker could possibly use this issue to cause OpenSSH to stop responding, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssl1.0.0 | <1.0.2g-1ubuntu4.20+esm2 | 1.0.2g-1ubuntu4.20+esm2 |
=16.04 | ||
All of | ||
ubuntu/libssl1.0.0 | <1.0.1f-1ubuntu2.27+esm5 | 1.0.1f-1ubuntu2.27+esm5 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenSSL vulnerability is CVE-2022-0778.
The severity level of this vulnerability has not been specified.
Ubuntu 14.04 ESM and Ubuntu 16.04 ESM are affected by this vulnerability.
The remedy for this OpenSSL vulnerability in Ubuntu 14.04 ESM is to update to version 1.0.1f-1ubuntu2.27+esm5 of the libssl1.0.0 package.
The remedy for this OpenSSL vulnerability in Ubuntu 16.04 ESM is to update to version 1.0.2g-1ubuntu4.20+esm2 of the libssl1.0.0 package.