Ubuntu 6330 Published by

Updated LibSSH and OpenSSL packages are available for Ubuntu Linux:

[USN-6592-2] libssh vulnerabilities
[USN-6622-1] OpenSSL vulnerabilities




[USN-6592-2] libssh vulnerabilities


==========================================================================
Ubuntu Security Notice USN-6592-2
February 05, 2024

libssh vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in libssh.

Software Description:
- libssh: A tiny C SSH library

Details:

USN-6592-1 fixed vulnerabilities in libssh. This update provides the
corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that libssh incorrectly handled the ProxyCommand and the
ProxyJump features. A remote attacker could possibly use this issue to
inject malicious code into the command of the features mentioned through
the hostname parameter. (CVE-2023-6004)

It was discovered that libssh incorrectly handled return codes when
performing message digest operations. A remote attacker could possibly use
this issue to cause libssh to crash, obtain sensitive information, or
execute arbitrary code. (CVE-2023-6918)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
libssh-4 0.8.0~20170825.94fa1e38-1ubuntu0.7+esm3
libssh-gcrypt-4 0.8.0~20170825.94fa1e38-1ubuntu0.7+esm3

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
libssh-4 0.6.3-4.3ubuntu0.6+esm1
libssh-gcrypt-4 0.6.3-4.3ubuntu0.6+esm1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6592-2
https://ubuntu.com/security/notices/USN-6592-1
CVE-2023-6004, CVE-2023-6918



[USN-6622-1] OpenSSL vulnerabilities


==========================================================================
Ubuntu Security Notice USN-6622-1
February 05, 2024

openssl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in OpenSSL.

Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools

Details:

David Benjamin discovered that OpenSSL incorrectly handled excessively long
X9.42 DH keys. A remote attacker could possibly use this issue to cause
OpenSSL to consume resources, leading to a denial of service.
(CVE-2023-5678)

Sverker Eriksson discovered that OpenSSL incorrectly handled POLY1304 MAC
on the PowerPC architecture. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and
Ubuntu 23.04. (CVE-2023-6129)

It was discovered that OpenSSL incorrectly handled excessively long RSA
public keys. A remote attacker could possibly use this issue to cause
OpenSSL to consume resources, leading to a denial of service. This issue
only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-6237)

Bahaa Naamneh discovered that OpenSSL incorrectly handled certain malformed
PKCS12 files. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. (CVE-2024-0727)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
libssl3 3.0.10-1ubuntu2.2

Ubuntu 22.04 LTS:
libssl3 3.0.2-0ubuntu1.14

Ubuntu 20.04 LTS:
libssl1.1 1.1.1f-1ubuntu2.21

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6622-1
CVE-2023-5678, CVE-2023-6129, CVE-2023-6237, CVE-2024-0727

Package Information:
https://launchpad.net/ubuntu/+source/openssl/3.0.10-1ubuntu2.2
https://launchpad.net/ubuntu/+source/openssl/3.0.2-0ubuntu1.14
https://launchpad.net/ubuntu/+source/openssl/1.1.1f-1ubuntu2.21