USN-6632-1: OpenSSL vulnerabilities
24672
07 August 2024
15 July 2024
CLOSED
LOW
CVE-2023-5678;CVE-2024-0727
Severity
low
Vendor
VMware Tanzu
Versions Affected
- Canonical Ubuntu 18.04
Description
David Benjamin discovered that OpenSSL incorrectly handled excessively long X9.42 DH keys. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. (CVE-2023-5678) Sverker Eriksson discovered that OpenSSL incorrectly handled POLY1304 MAC on the PowerPC architecture. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-6129) It was discovered that OpenSSL incorrectly handled excessively long RSA public keys. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-6237) Bahaa Naamneh discovered that OpenSSL incorrectly handled certain malformed PKCS12 files. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2024-0727) Update Instructions: Run `sudo pro fix USN-6622-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl1.1 - 1.1.1f-1ubuntu2.21 libssl-dev - 1.1.1f-1ubuntu2.21 openssl - 1.1.1f-1ubuntu2.21 libssl-doc - 1.1.1f-1ubuntu2.21 No subscription required.
Fixed VMware Products and Versions
- Platform Automation Toolkit
- 4.4.32 or greater
- 5.0.25 or greater
- 5.1.2 or greater
- Tanzu Greenplum for Kubernetes
- 2.0.0 or greater
- Xenial Stemcells
- 621.872 or greater
- CF Deployment
- 30.0.0 or greater
- Operation Manager Image
- 2.10.71 or greater
- Operation Manager
- 2.10.71 or greater
References
https://ubuntu.com/security/notices/USN-6632-1
https://www.cloudfoundry.org/blog/usn-6632-1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=usn-6632-1
History
2024-02-13: Initial vulnerability report published.