USN-6632-1: OpenSSL vulnerabilities

Operations Manager

3 more products

24672

07 August 2024

15 July 2024

CLOSED

LOW

CVE-2023-5678;CVE-2024-0727

Severity

low

Vendor

VMware Tanzu

Versions Affected

  • Canonical Ubuntu 18.04

Description

David Benjamin discovered that OpenSSL incorrectly handled excessively long X9.42 DH keys. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. (CVE-2023-5678) Sverker Eriksson discovered that OpenSSL incorrectly handled POLY1304 MAC on the PowerPC architecture. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-6129) It was discovered that OpenSSL incorrectly handled excessively long RSA public keys. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-6237) Bahaa Naamneh discovered that OpenSSL incorrectly handled certain malformed PKCS12 files. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2024-0727) Update Instructions: Run `sudo pro fix USN-6622-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libssl1.1 - 1.1.1f-1ubuntu2.21 libssl-dev - 1.1.1f-1ubuntu2.21 openssl - 1.1.1f-1ubuntu2.21 libssl-doc - 1.1.1f-1ubuntu2.21 No subscription required.

Fixed VMware Products and Versions

  • Platform Automation Toolkit
    • 4.4.32 or greater
    • 5.0.25 or greater
    • 5.1.2 or greater
  • Tanzu Greenplum for Kubernetes
    • 2.0.0 or greater
  • Xenial Stemcells
    • 621.872 or greater
  • CF Deployment
    • 30.0.0 or greater
  • Operation Manager Image
    • 2.10.71 or greater
  • Operation Manager
    • 2.10.71 or greater

References

https://ubuntu.com/security/notices/USN-6632-1

https://www.cloudfoundry.org/blog/usn-6632-1

https://cve.mitre.org/cgi-bin/cvename.cgi?name=usn-6632-1

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24672

History

2024-02-13: Initial vulnerability report published.