First published: Wed Oct 18 2023(Updated: )
It was discovered that OpenSSL incorrectly handled excessively large Diffie-Hellman parameters. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-3446) Bernd Edlinger discovered that OpenSSL incorrectly handled excessively large Diffie-Hellman parameters. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-3817)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssl1.1 | <1.1.1-1ubuntu2.1~18.04.23+esm3 | 1.1.1-1ubuntu2.1~18.04.23+esm3 |
=18.04 | ||
All of | ||
ubuntu/openssl | <1.1.1-1ubuntu2.1~18.04.23+esm3 | 1.1.1-1ubuntu2.1~18.04.23+esm3 |
=18.04 | ||
All of | ||
ubuntu/libssl1.0.0 | <1.0.2g-1ubuntu4.20+esm10 | 1.0.2g-1ubuntu4.20+esm10 |
=16.04 | ||
All of | ||
ubuntu/openssl | <1.0.2g-1ubuntu4.20+esm10 | 1.0.2g-1ubuntu4.20+esm10 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the OpenSSL vulnerabilities is CVE-2023-3446.
The severity of the OpenSSL vulnerabilities is not specified in the provided information.
The OpenSSL vulnerabilities can be exploited by using excessively large Diffie-Hellman parameters to cause a denial of service.
The OpenSSL vulnerabilities affect Ubuntu 18.04 and Ubuntu 16.04.
To fix the OpenSSL vulnerabilities, update the libssl1.1 and openssl packages to the specified versions mentioned in the security notices.