First published: Thu May 26 2022(Updated: )
USN-5402-1 fixed several vulnerabilities in OpenSSL. This update provides the corresponding update for Ubuntu 16.04 ESM. Original advisory details: Elison Niven discovered that OpenSSL incorrectly handled the c_rehash script. A local attacker could possibly use this issue to execute arbitrary commands when c_rehash is run. (CVE-2022-1292) Aliaksei Levin discovered that OpenSSL incorrectly handled resources when decoding certificates and keys. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1473)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssl1.0.0 | <1.0.2g-1ubuntu4.20+esm3 | 1.0.2g-1ubuntu4.20+esm3 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is USN-5402-2.
The libssl1.0.0 package on Ubuntu 16.04 ESM is affected by this vulnerability.
The severity of this vulnerability is not provided in the information provided.
You can fix this vulnerability by updating the libssl1.0.0 package to version 1.0.2g-1ubuntu4.20+esm3 or later.
You can find more information about this vulnerability in the references provided: [USN-5402-1](https://ubuntu.com/security/notices/USN-5402-1), [CVE-2022-1473](https://ubuntu.com/security/CVE-2022-1473), [CVE-2022-1292](https://ubuntu.com/security/CVE-2022-1292).