{"id":"USN-7018-1","summary":"openssl vulnerabilities","details":"Robert Merget, Marcus Brinkmann, Nimrod Aviram, and Juraj Somorovsky\ndiscovered that certain Diffie-Hellman ciphersuites in the TLS\nspecification and implemented by OpenSSL contained a flaw. A remote\nattacker could possibly use this issue to eavesdrop on encrypted\ncommunications. This was fixed in this update by removing the insecure\nciphersuites from OpenSSL. (CVE-2020-1968)\n\nPaul Kehrer discovered that OpenSSL incorrectly handled certain input\nlengths in EVP functions. A remote attacker could possibly use this issue\nto cause OpenSSL to crash, resulting in a denial of service.\n(CVE-2021-23840)\n\nElison Niven discovered that OpenSSL incorrectly handled the c_rehash\nscript. A local attacker could possibly use this issue to execute arbitrary\ncommands when c_rehash is run. (CVE-2022-1292)\n\nChancen and Daniel Fiala discovered that OpenSSL incorrectly handled the\nc_rehash script. A local attacker could possibly use this issue to execute\narbitrary commands when c_rehash is run. (CVE-2022-2068)\n\nIt was discovered that OpenSSL incorrectly handled excessively large\nDiffie-Hellman parameters. An attacker could possibly use this issue\nto cause a denial of service. (CVE-2023-3446)\n\nBahaa Naamneh discovered that OpenSSL incorrectly handled certain malformed\nPKCS12 files. A remote attacker could possibly use this issue to cause\nOpenSSL to crash, resulting in a denial of service. (CVE-2024-0727)\n","modified":"2026-04-27T17:29:56.980562Z","published":"2024-09-18T00:38:46Z","related":["UBUNTU-CVE-2020-1968","UBUNTU-CVE-2021-23840","UBUNTU-CVE-2022-1292","UBUNTU-CVE-2022-2068","UBUNTU-CVE-2023-3446","UBUNTU-CVE-2024-0727"],"upstream":["CVE-2020-1968","CVE-2021-23840","CVE-2022-1292","CVE-2022-2068","CVE-2023-3446","CVE-2024-0727","UBUNTU-CVE-2020-1968","UBUNTU-CVE-2021-23840","UBUNTU-CVE-2022-1292","UBUNTU-CVE-2022-2068","UBUNTU-CVE-2023-3446","UBUNTU-CVE-2024-0727"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7018-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-1968"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23840"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1292"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2068"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3446"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-0727"}],"affected":[{"package":{"name":"openssl","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/openssl@1.0.1f-1ubuntu2.27+esm10?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.1f-1ubuntu2.27+esm10"}]}],"versions":["1.0.1e-3ubuntu1","1.0.1e-4ubuntu1","1.0.1e-4ubuntu2","1.0.1e-4ubuntu3","1.0.1e-4ubuntu4","1.0.1f-1ubuntu1","1.0.1f-1ubuntu2","1.0.1f-1ubuntu2.1","1.0.1f-1ubuntu2.2","1.0.1f-1ubuntu2.3","1.0.1f-1ubuntu2.4","1.0.1f-1ubuntu2.5","1.0.1f-1ubuntu2.7","1.0.1f-1ubuntu2.8","1.0.1f-1ubuntu2.11","1.0.1f-1ubuntu2.12","1.0.1f-1ubuntu2.15","1.0.1f-1ubuntu2.16","1.0.1f-1ubuntu2.17","1.0.1f-1ubuntu2.18","1.0.1f-1ubuntu2.19","1.0.1f-1ubuntu2.20","1.0.1f-1ubuntu2.21","1.0.1f-1ubuntu2.22","1.0.1f-1ubuntu2.23","1.0.1f-1ubuntu2.24","1.0.1f-1ubuntu2.25","1.0.1f-1ubuntu2.26","1.0.1f-1ubuntu2.27","1.0.1f-1ubuntu2.27+esm1","1.0.1f-1ubuntu2.27+esm2","1.0.1f-1ubuntu2.27+esm3","1.0.1f-1ubuntu2.27+esm4","1.0.1f-1ubuntu2.27+esm5","1.0.1f-1ubuntu2.27+esm6","1.0.1f-1ubuntu2.27+esm7","1.0.1f-1ubuntu2.27+esm9"],"ecosystem_specific":{"binaries":[{"binary_name":"libssl1.0.0","binary_version":"1.0.1f-1ubuntu2.27+esm10"},{"binary_name":"openssl","binary_version":"1.0.1f-1ubuntu2.27+esm10"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2020-1968","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-23840","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-1292","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-2068","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-3446","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2024-0727","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7018-1.json"}}],"schema_version":"1.7.5"}