[USN-6592-2] libssh vulnerabilities

2024-02-05 Thread Camila Camargo de Matos

==
Ubuntu Security Notice USN-6592-2
February 05, 2024

libssh vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in libssh.

Software Description:
- libssh: A tiny C SSH library

Details:

USN-6592-1 fixed vulnerabilities in libssh. This update provides the
corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that libssh incorrectly handled the ProxyCommand and the
ProxyJump features. A remote attacker could possibly use this issue to
inject malicious code into the command of the features mentioned through
the hostname parameter. (CVE-2023-6004)

It was discovered that libssh incorrectly handled return codes when
performing message digest operations. A remote attacker could possibly use
this issue to cause libssh to crash, obtain sensitive information, or
execute arbitrary code. (CVE-2023-6918)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
libssh-4 0.8.0~20170825.94fa1e38-1ubuntu0.7+esm3
libssh-gcrypt-4 0.8.0~20170825.94fa1e38-1ubuntu0.7+esm3

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
libssh-4 0.6.3-4.3ubuntu0.6+esm1
libssh-gcrypt-4 0.6.3-4.3ubuntu0.6+esm1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6592-2
https://ubuntu.com/security/notices/USN-6592-1
CVE-2023-6004, CVE-2023-6918



OpenPGP_signature.asc
Description: OpenPGP digital signature



[USN-6622-1] OpenSSL vulnerabilities

2024-02-05 Thread Marc Deslauriers

==
Ubuntu Security Notice USN-6622-1
February 05, 2024

openssl vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in OpenSSL.

Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools

Details:

David Benjamin discovered that OpenSSL incorrectly handled excessively long
X9.42 DH keys. A remote attacker could possibly use this issue to cause
OpenSSL to consume resources, leading to a denial of service.
(CVE-2023-5678)

Sverker Eriksson discovered that OpenSSL incorrectly handled POLY1304 MAC
on the PowerPC architecture. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and
Ubuntu 23.04. (CVE-2023-6129)

It was discovered that OpenSSL incorrectly handled excessively long RSA
public keys. A remote attacker could possibly use this issue to cause
OpenSSL to consume resources, leading to a denial of service. This issue
only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-6237)

Bahaa Naamneh discovered that OpenSSL incorrectly handled certain malformed
PKCS12 files. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. (CVE-2024-0727)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  libssl3 3.0.10-1ubuntu2.2

Ubuntu 22.04 LTS:
  libssl3 3.0.2-0ubuntu1.14

Ubuntu 20.04 LTS:
  libssl1.1   1.1.1f-1ubuntu2.21

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6622-1
  CVE-2023-5678, CVE-2023-6129, CVE-2023-6237, CVE-2024-0727

Package Information:
  https://launchpad.net/ubuntu/+source/openssl/3.0.10-1ubuntu2.2
  https://launchpad.net/ubuntu/+source/openssl/3.0.2-0ubuntu1.14
  https://launchpad.net/ubuntu/+source/openssl/1.1.1f-1ubuntu2.21



OpenPGP_signature.asc
Description: OpenPGP digital signature