Lucene search

K
ubuntuUbuntuUSN-5402-1
HistoryMay 04, 2022 - 12:00 a.m.

OpenSSL vulnerabilities

2022-05-0400:00:00
ubuntu.com
136

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

Low

0.106 Low

EPSS

Percentile

95.1%

Releases

  • Ubuntu 22.04 LTS
  • Ubuntu 21.10
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • openssl - Secure Socket Layer (SSL) cryptographic library and tools
  • openssl1.0 - Secure Socket Layer (SSL) cryptographic library and tools

Details

Elison Niven discovered that OpenSSL incorrectly handled the c_rehash
script. A local attacker could possibly use this issue to execute arbitrary
commands when c_rehash is run. (CVE-2022-1292)

Raul Metsma discovered that OpenSSL incorrectly verified certain response
signing certificates. A remote attacker could possibly use this issue to
spoof certain response signing certificates. This issue only affected
Ubuntu 22.04 LTS. (CVE-2022-1343)

Tom Colley discovered that OpenSSL used the incorrect MAC key in the
RC4-MD5 ciphersuite. In non-default configurations were RC4-MD5 is enabled,
a remote attacker could possibly use this issue to modify encrypted
communications. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1434)

Aliaksei Levin discovered that OpenSSL incorrectly handled resources when
decoding certificates and keys. A remote attacker could possibly use this
issue to cause OpenSSL to consume resources, leading to a denial of
service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1473)

OSVersionArchitecturePackageVersionFilename
Ubuntu22.04noarchlibssl3< 3.0.2-0ubuntu1.1UNKNOWN
Ubuntu22.04noarchlibssl-dev< 3.0.2-0ubuntu1.1UNKNOWN
Ubuntu22.04noarchlibssl-doc< 3.0.2-0ubuntu1.1UNKNOWN
Ubuntu22.04noarchlibssl3-dbgsym< 3.0.2-0ubuntu1.1UNKNOWN
Ubuntu22.04noarchopenssl< 3.0.2-0ubuntu1.1UNKNOWN
Ubuntu22.04noarchopenssl-dbgsym< 3.0.2-0ubuntu1.1UNKNOWN
Ubuntu21.10noarchlibssl1.1< 1.1.1l-1ubuntu1.3UNKNOWN
Ubuntu21.10noarchlibssl-dev< 1.1.1l-1ubuntu1.3UNKNOWN
Ubuntu21.10noarchlibssl-doc< 1.1.1l-1ubuntu1.3UNKNOWN
Ubuntu21.10noarchlibssl1.1-dbgsym< 1.1.1l-1ubuntu1.3UNKNOWN
Rows per page:
1-10 of 351

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

Low

0.106 Low

EPSS

Percentile

95.1%