{"id":"USN-2639-1","summary":"openssl vulnerabilities","details":"Praveen Kariyanahalli, Ivan Fratric and Felix Groebert discovered that\nOpenSSL incorrectly handled memory when buffering DTLS data. A remote\nattacker could use this issue to cause OpenSSL to crash, resulting in a\ndenial of service, or possibly execute arbitrary code. (CVE-2014-8176)\n\nJoseph Barr-Pixton discovered that OpenSSL incorrectly handled malformed\nECParameters structures. A remote attacker could use this issue to cause\nOpenSSL to hang, resulting in a denial of service. (CVE-2015-1788)\n\nRobert Swiecki and Hanno Böck discovered that OpenSSL incorrectly handled\ncertain ASN1_TIME strings. A remote attacker could use this issue to cause\nOpenSSL to crash, resulting in a denial of service. (CVE-2015-1789)\n\nMichal Zalewski discovered that OpenSSL incorrectly handled missing content\nwhen parsing ASN.1-encoded PKCS#7 blobs. A remote attacker could use this\nissue to cause OpenSSL to crash, resulting in a denial of service.\n(CVE-2015-1790)\n\nEmilia Käsper discovered that OpenSSL incorrectly handled NewSessionTicket\nwhen being used by a multi-threaded client. A remote attacker could use\nthis issue to cause OpenSSL to crash, resulting in a denial of service.\n(CVE-2015-1791)\n\nJohannes Bauer discovered that OpenSSL incorrectly handled verifying\nsignedData messages using the CMS code. A remote attacker could use this\nissue to cause OpenSSL to hang, resulting in a denial of service.\n(CVE-2015-1792)\n\nAs a security improvement, this update also modifies OpenSSL behaviour to\nreject DH key sizes below 768 bits, preventing a possible downgrade\nattack.\n","modified":"2026-04-22T09:13:07.956583Z","published":"2015-06-11T18:07:09Z","related":["UBUNTU-CVE-2014-8176","UBUNTU-CVE-2015-1788","UBUNTU-CVE-2015-1789","UBUNTU-CVE-2015-1790","UBUNTU-CVE-2015-1791","UBUNTU-CVE-2015-1792","UBUNTU-CVE-2015-4000"],"upstream":["CVE-2014-8176","CVE-2015-1788","CVE-2015-1789","CVE-2015-1790","CVE-2015-1791","CVE-2015-1792","UBUNTU-CVE-2014-8176","UBUNTU-CVE-2015-1788","UBUNTU-CVE-2015-1789","UBUNTU-CVE-2015-1790","UBUNTU-CVE-2015-1791","UBUNTU-CVE-2015-1792"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2639-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-8176"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-1788"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-1789"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-1790"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-1791"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-1792"}],"affected":[{"package":{"name":"openssl","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/openssl@1.0.1f-1ubuntu2.15?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.1f-1ubuntu2.15"}]}],"versions":["1.0.1e-3ubuntu1","1.0.1e-4ubuntu1","1.0.1e-4ubuntu2","1.0.1e-4ubuntu3","1.0.1e-4ubuntu4","1.0.1f-1ubuntu1","1.0.1f-1ubuntu2","1.0.1f-1ubuntu2.1","1.0.1f-1ubuntu2.2","1.0.1f-1ubuntu2.3","1.0.1f-1ubuntu2.4","1.0.1f-1ubuntu2.5","1.0.1f-1ubuntu2.7","1.0.1f-1ubuntu2.8","1.0.1f-1ubuntu2.11","1.0.1f-1ubuntu2.12"],"ecosystem_specific":{"binaries":[{"binary_name":"libssl1.0.0","binary_version":"1.0.1f-1ubuntu2.15"},{"binary_name":"openssl","binary_version":"1.0.1f-1ubuntu2.15"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-8176"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-1788"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-1789"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-1790"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-1791"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-1792"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2639-1.json"}}],"schema_version":"1.7.5"}