Bosch CERT Advisory: OpenSSL Multiple Vulnerabilities
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
openssl (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Description
Multiple vulnerabilities have been reported in OpenSSL, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).
1
An error when validating CA certificates can be exploited to bypass certificate validation checks.
Successful exploitation of the vulnerability #1 requires the X509_V_
2
A NULL-pointer deference error when handling renegotiation ClientHello messages can be exploited to crash the OpenSSL TLS server.
Successful exploitation of the vulnerability #2 requires an OpenSSL server with TLSv1.2 and renegotiation enabled (enabled by default).
The vulnerabilities are reported in versions prior to 1.1.1k.
Affected Software
The following software is affected by the described vulnerability. Please check the vendor links below to see if exactly your version is affected.
OpenSSL 1.x
Solution
Update to version 1.1.1k.
References
1. https:/
2. https:/
Please provide a fix as soon as possible.
This was addressed in https:/ /ubuntu. com/security/ notices/ USN-4891- 1 .