{"id":"USN-6435-2","summary":"openssl vulnerabilities","details":"USN-6435-1 fixed vulnerabilities in OpenSSL. This update\nprovides the corresponding updates for Ubuntu 20.04 LTS.\n\nOriginal advisory details:\n\n It was discovered that OpenSSL incorrectly handled excessively large\n Diffie-Hellman parameters. An attacker could possibly use this issue\n to cause a denial of service. (CVE-2023-3446)\n \n Bernd Edlinger discovered that OpenSSL incorrectly handled excessively\n large Diffie-Hellman parameters. An attacker could possibly use this\n issue to cause a denial of service. (CVE-2023-3817)\n","modified":"2026-04-24T09:43:06.898110Z","published":"2023-10-25T12:40:20Z","related":["UBUNTU-CVE-2023-3446","UBUNTU-CVE-2023-3817"],"upstream":["CVE-2023-3446","CVE-2023-3817","UBUNTU-CVE-2023-3446","UBUNTU-CVE-2023-3817"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6435-2"}],"affected":[{"package":{"name":"openssl","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/openssl@1.1.1f-1ubuntu2.20?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.1f-1ubuntu2.20"}]}],"versions":["1.1.1c-1ubuntu4","1.1.1d-2ubuntu3","1.1.1d-2ubuntu6","1.1.1f-1ubuntu1","1.1.1f-1ubuntu2","1.1.1f-1ubuntu2.1","1.1.1f-1ubuntu2.2","1.1.1f-1ubuntu2.3","1.1.1f-1ubuntu2.4","1.1.1f-1ubuntu2.5","1.1.1f-1ubuntu2.8","1.1.1f-1ubuntu2.9","1.1.1f-1ubuntu2.10","1.1.1f-1ubuntu2.11","1.1.1f-1ubuntu2.12","1.1.1f-1ubuntu2.13","1.1.1f-1ubuntu2.15","1.1.1f-1ubuntu2.16","1.1.1f-1ubuntu2.17","1.1.1f-1ubuntu2.18","1.1.1f-1ubuntu2.19"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libssl1.1","binary_version":"1.1.1f-1ubuntu2.20"},{"binary_name":"openssl","binary_version":"1.1.1f-1ubuntu2.20"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6435-2.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:20.04:LTS"}}}],"schema_version":"1.7.5"}