USN-5051-2: OpenSSL vulnerability
26 August 2021
OpenSSL could be made to crash or expose sensitive information if it received a specially crafted ASN.1 string.
Releases
Packages
- openssl - Secure Socket Layer (SSL) cryptographic library and tools
Details
USN-5051-1 fixed a vulnerability in OpenSSL. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Ingo Schwarze discovered that OpenSSL incorrectly handled certain ASN.1
strings. A remote attacker could use this issue to cause OpenSSL to crash,
resulting in a denial of service, or possibly obtain sensitive information.
(CVE-2021-3712)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
libssl1.0.0
-
1.0.2g-1ubuntu4.20+esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
libssl1.0.0
-
1.0.1f-1ubuntu2.27+esm3
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-5051-1: libssl-dev, libssl-doc, openssl, libssl1.1
- USN-5051-3: libssl1.0-dev, openssl1.0, libssl1.0.0
- USN-5088-1: qemu-efi-arm, qemu-efi, qemu-efi-aarch64, ovmf, ovmf-ia32, edk2