Vulnerabilities |
55 via 126 paths |
---|---|
Dependencies |
401 |
Source |
Docker |
Target OS |
ubuntu:22.04 |
high severity
- Vulnerable module: glibc/libc-bin
- Introduced through: glibc/libc-bin@2.35-0ubuntu3.1 and glibc/libc6@2.35-0ubuntu3.1
- Fixed in: 2.35-0ubuntu3.4
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › glibc/libc-bin@2.35-0ubuntu3.1
-
Introduced through: concourse/concourse@ubuntu › glibc/libc6@2.35-0ubuntu3.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc
package and not the glibc
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
Remediation
Upgrade Ubuntu:22.04
glibc
to version 2.35-0ubuntu3.4 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-4911
- https://access.redhat.com/security/cve/CVE-2023-4911
- https://bugzilla.redhat.com/show_bug.cgi?id=2238352
- https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
- https://www.qualys.com/cve-2023-4911/
- http://www.openwall.com/lists/oss-security/2023/10/03/2
- http://www.openwall.com/lists/oss-security/2023/10/03/3
- https://www.debian.org/security/2023/dsa-5514
- https://security.gentoo.org/glsa/202310-03
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/
- http://www.openwall.com/lists/oss-security/2023/10/05/1
- https://access.redhat.com/errata/RHSA-2023:5453
- https://access.redhat.com/errata/RHSA-2023:5454
- https://access.redhat.com/errata/RHSA-2023:5455
- https://access.redhat.com/errata/RHSA-2023:5476
- http://seclists.org/fulldisclosure/2023/Oct/11
- http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html
- https://security.netapp.com/advisory/ntap-20231013-0006/
- http://www.openwall.com/lists/oss-security/2023/10/13/11
- http://www.openwall.com/lists/oss-security/2023/10/14/3
- http://www.openwall.com/lists/oss-security/2023/10/14/5
- http://www.openwall.com/lists/oss-security/2023/10/14/6
- http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation.html
- https://access.redhat.com/errata/RHSA-2024:0033
- https://github.com/projectdiscovery/nuclei-templates/blob/master/code/cves/2023/CVE-2023-4911.yaml
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
medium severity
- Vulnerable module: perl/perl-base
- Introduced through: perl/perl-base@5.34.0-3ubuntu1.1
- Fixed in: 5.34.0-3ubuntu1.2
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › perl/perl-base@5.34.0-3ubuntu1.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream perl
package and not the perl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.
Remediation
Upgrade Ubuntu:22.04
perl
to version 5.34.0-3ubuntu1.2 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-31484
- https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
- https://github.com/andk/cpanpm/pull/175
- https://metacpan.org/dist/CPAN/changes
- https://www.openwall.com/lists/oss-security/2023/04/18/14
- http://www.openwall.com/lists/oss-security/2023/04/29/1
- http://www.openwall.com/lists/oss-security/2023/05/03/3
- http://www.openwall.com/lists/oss-security/2023/05/03/5
- http://www.openwall.com/lists/oss-security/2023/05/07/2
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
medium severity
- Vulnerable module: bash
- Introduced through: bash@5.1-6ubuntu1
- Fixed in: 5.1-6ubuntu1.1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › bash@5.1-6ubuntu1
NVD Description
Note: Versions mentioned in the description apply only to the upstream bash
package and not the bash
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.
Remediation
Upgrade Ubuntu:22.04
bash
to version 5.1-6ubuntu1.1 or higher.
References
medium severity
- Vulnerable module: libcap2
- Introduced through: libcap2@1:2.44-1build3, libcap2/libcap2-bin@1:2.44-1build3 and others
- Fixed in: 1:2.44-1ubuntu0.22.04.1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › libcap2@1:2.44-1build3
-
Introduced through: concourse/concourse@ubuntu › libcap2/libcap2-bin@1:2.44-1build3
-
Introduced through: concourse/concourse@ubuntu › libcap2/libpam-cap@1:2.44-1build3
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcap2
package and not the libcap2
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.
Remediation
Upgrade Ubuntu:22.04
libcap2
to version 1:2.44-1ubuntu0.22.04.1 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-2603
- https://bugzilla.redhat.com/show_bug.cgi?id=2209113
- https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/
medium severity
- Vulnerable module: ncurses/libncurses6
- Introduced through: ncurses/libncurses6@6.3-2, ncurses/libncursesw6@6.3-2 and others
- Fixed in: 6.3-2ubuntu0.1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › ncurses/libncurses6@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/libncursesw6@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/libtinfo6@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/ncurses-base@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/ncurses-bin@6.3-2
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses
package and not the ncurses
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
Remediation
Upgrade Ubuntu:22.04
ncurses
to version 6.3-2ubuntu0.1 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-29491
- http://ncurses.scripts.mit.edu/?p=ncurses.git;a=commit;h=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
- https://www.openwall.com/lists/oss-security/2023/04/12/5
- https://www.openwall.com/lists/oss-security/2023/04/13/4
- http://www.openwall.com/lists/oss-security/2023/04/19/10
- http://www.openwall.com/lists/oss-security/2023/04/19/11
- https://security.netapp.com/advisory/ntap-20230517-0009/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
- http://ncurses.scripts.mit.edu/?p=ncurses.git%3Ba=commit%3Bh=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
- https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
medium severity
- Vulnerable module: perl/perl-base
- Introduced through: perl/perl-base@5.34.0-3ubuntu1.1
- Fixed in: 5.34.0-3ubuntu1.3
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › perl/perl-base@5.34.0-3ubuntu1.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream perl
package and not the perl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A vulnerability was found in perl. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.
Remediation
Upgrade Ubuntu:22.04
perl
to version 5.34.0-3ubuntu1.3 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-47038
- https://access.redhat.com/security/cve/CVE-2023-47038
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746
- https://bugzilla.redhat.com/show_bug.cgi?id=2249523
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/
- https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property
medium severity
- Vulnerable module: glibc/libc-bin
- Introduced through: glibc/libc-bin@2.35-0ubuntu3.1 and glibc/libc6@2.35-0ubuntu3.1
- Fixed in: 2.35-0ubuntu3.5
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › glibc/libc-bin@2.35-0ubuntu3.1
-
Introduced through: concourse/concourse@ubuntu › glibc/libc6@2.35-0ubuntu3.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc
package and not the glibc
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.
Remediation
Upgrade Ubuntu:22.04
glibc
to version 2.35-0ubuntu3.5 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-5156
- https://access.redhat.com/security/cve/CVE-2023-5156
- https://bugzilla.redhat.com/show_bug.cgi?id=2240541
- https://sourceware.org/bugzilla/show_bug.cgi?id=30884
- https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796
- http://www.openwall.com/lists/oss-security/2023/10/03/4
- http://www.openwall.com/lists/oss-security/2023/10/03/5
- http://www.openwall.com/lists/oss-security/2023/10/03/6
- http://www.openwall.com/lists/oss-security/2023/10/03/8
- https://security.gentoo.org/glsa/202402-01
medium severity
- Vulnerable module: gnutls28/libgnutls30
- Introduced through: gnutls28/libgnutls30@3.7.3-4ubuntu1.2
- Fixed in: 3.7.3-4ubuntu1.4
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › gnutls28/libgnutls30@3.7.3-4ubuntu1.2
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnutls28
package and not the gnutls28
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.
Remediation
Upgrade Ubuntu:22.04
gnutls28
to version 3.7.3-4ubuntu1.4 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-0567
- https://access.redhat.com/security/cve/CVE-2024-0567
- https://bugzilla.redhat.com/show_bug.cgi?id=2258544
- https://gitlab.com/gnutls/gnutls/-/issues/1521
- https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
- http://www.openwall.com/lists/oss-security/2024/01/19/3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
- https://access.redhat.com/errata/RHSA-2024:0533
- https://security.netapp.com/advisory/ntap-20240202-0011/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
- https://access.redhat.com/errata/RHSA-2024:1082
medium severity
- Vulnerable module: gnutls28/libgnutls30
- Introduced through: gnutls28/libgnutls30@3.7.3-4ubuntu1.2
- Fixed in: 3.7.3-4ubuntu1.4
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › gnutls28/libgnutls30@3.7.3-4ubuntu1.2
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnutls28
package and not the gnutls28
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.
Remediation
Upgrade Ubuntu:22.04
gnutls28
to version 3.7.3-4ubuntu1.4 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-0553
- https://access.redhat.com/security/cve/CVE-2024-0553
- https://bugzilla.redhat.com/show_bug.cgi?id=2258412
- https://gitlab.com/gnutls/gnutls/-/issues/1522
- https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
- http://www.openwall.com/lists/oss-security/2024/01/19/3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
- https://access.redhat.com/errata/RHSA-2024:0533
- https://access.redhat.com/errata/RHSA-2024:0627
- https://security.netapp.com/advisory/ntap-20240202-0011/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
- https://access.redhat.com/errata/RHSA-2024:0796
- https://lists.debian.org/debian-lts-announce/2024/02/msg00010.html
- https://access.redhat.com/errata/RHSA-2024:1082
- https://access.redhat.com/errata/RHSA-2024:1108
medium severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.12
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers.
Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes.
When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB.
For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse.
Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical.
Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall.
The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary.
OpenSSL 3.1 and 3.0 are vulnerable to this issue.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.12 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-5363
- http://www.openwall.com/lists/oss-security/2023/10/24/1
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0df40630850fb2740e6be6890bb905d3fc623b2d
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5f69f5c65e483928c4b28ed16af6e5742929f1ee
- https://www.debian.org/security/2023/dsa-5532
- https://www.openssl.org/news/secadv/20231024.txt
- https://security.netapp.com/advisory/ntap-20231027-0010/
- https://security.netapp.com/advisory/ntap-20240201-0003/
- https://security.netapp.com/advisory/ntap-20240201-0004/
medium severity
- Vulnerable module: krb5/libgssapi-krb5-2
- Introduced through: krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1, krb5/libk5crypto3@1.19.2-2ubuntu0.1 and others
- Fixed in: 1.19.2-2ubuntu0.3
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libk5crypto3@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libkrb5-3@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libkrb5support0@1.19.2-2ubuntu0.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5
package and not the krb5
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.
Remediation
Upgrade Ubuntu:22.04
krb5
to version 1.19.2-2ubuntu0.3 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-36054
- https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd
- https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final
- https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final
- https://web.mit.edu/kerberos/www/advisories/
- https://security.netapp.com/advisory/ntap-20230908-0004/
- https://lists.debian.org/debian-lts-announce/2023/10/msg00031.html
medium severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.10
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow.
Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service.
An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods.
When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(n^2) with 'n' being the size of the sub-identifiers in bytes (*).
With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms.
Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data.
Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low.
In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature.
The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer's certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication.
In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.10 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-2650
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=423a2bc737a908ad0c77bda470b2b59dc879936b
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=853c5e56ee0b8650c73140816bb8b91d6163422c
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9e209944b35cf82368071f160a744b6178f9b098
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db779b0e10b047f2585615e0b8f2acdf21f8544a
- https://www.openssl.org/news/secadv/20230530.txt
- http://www.openwall.com/lists/oss-security/2023/05/30/1
- https://www.debian.org/security/2023/dsa-5417
- https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0009
- https://security.netapp.com/advisory/ntap-20230703-0001/
- https://security.netapp.com/advisory/ntap-20231027-0009/
- https://security.gentoo.org/glsa/202402-08
medium severity
- Vulnerable module: gnutls28/libgnutls30
- Introduced through: gnutls28/libgnutls30@3.7.3-4ubuntu1.2
- Fixed in: 3.7.3-4ubuntu1.3
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › gnutls28/libgnutls30@3.7.3-4ubuntu1.2
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnutls28
package and not the gnutls28
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
Remediation
Upgrade Ubuntu:22.04
gnutls28
to version 3.7.3-4ubuntu1.3 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-5981
- https://access.redhat.com/security/cve/CVE-2023-5981
- https://bugzilla.redhat.com/show_bug.cgi?id=2248445
- https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
- https://access.redhat.com/errata/RHSA-2024:0155
- http://www.openwall.com/lists/oss-security/2024/01/19/3
- https://access.redhat.com/errata/RHSA-2024:0319
- https://access.redhat.com/errata/RHSA-2024:0399
- https://access.redhat.com/errata/RHSA-2024:0451
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
- https://access.redhat.com/errata/RHSA-2024:0533
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
medium severity
- Vulnerable module: file
- Introduced through: file@1:5.41-3, file/libmagic-mgc@1:5.41-3 and others
- Fixed in: 1:5.41-3ubuntu0.1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › file@1:5.41-3
-
Introduced through: concourse/concourse@ubuntu › file/libmagic-mgc@1:5.41-3
-
Introduced through: concourse/concourse@ubuntu › file/libmagic1@1:5.41-3
NVD Description
Note: Versions mentioned in the description apply only to the upstream file
package and not the file
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.
Remediation
Upgrade Ubuntu:22.04
file
to version 1:5.41-3ubuntu0.1 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-48554
- https://bugs.astron.com/view.php?id=310
- https://www.debian.org/security/2023/dsa-5489
- https://security.netapp.com/advisory/ntap-20231116-0002/
- https://support.apple.com/kb/HT214081
- https://support.apple.com/kb/HT214084
- https://support.apple.com/kb/HT214086
- https://support.apple.com/kb/HT214088
- http://seclists.org/fulldisclosure/2024/Mar/21
- http://seclists.org/fulldisclosure/2024/Mar/24
- http://seclists.org/fulldisclosure/2024/Mar/25
medium severity
- Vulnerable module: pam/libpam-modules
- Introduced through: pam/libpam-modules@1.4.0-11ubuntu2.3, pam/libpam-modules-bin@1.4.0-11ubuntu2.3 and others
- Fixed in: 1.4.0-11ubuntu2.4
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › pam/libpam-modules@1.4.0-11ubuntu2.3
-
Introduced through: concourse/concourse@ubuntu › pam/libpam-modules-bin@1.4.0-11ubuntu2.3
-
Introduced through: concourse/concourse@ubuntu › pam/libpam-runtime@1.4.0-11ubuntu2.3
-
Introduced through: concourse/concourse@ubuntu › pam/libpam0g@1.4.0-11ubuntu2.3
NVD Description
Note: Versions mentioned in the description apply only to the upstream pam
package and not the pam
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.
Remediation
Upgrade Ubuntu:22.04
pam
to version 1.4.0-11ubuntu2.4 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-22365
- http://www.openwall.com/lists/oss-security/2024/01/18/3
- https://github.com/linux-pam/linux-pam
- https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb
- https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0
medium severity
- Vulnerable module: xz-utils/liblzma5
- Introduced through: xz-utils/liblzma5@5.2.5-2ubuntu1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › xz-utils/liblzma5@5.2.5-2ubuntu1
NVD Description
Note: Versions mentioned in the description apply only to the upstream xz-utils
package and not the xz-utils
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
An issue discovered in XZ 5.2.5 allows attackers to cause a denial of service via decompression of a crafted file. NOTE: the vendor disputes the claims of "endless output" and "denial of service" because decompression of the 17,486 bytes always results in 114,881,179 bytes, which is often a reasonable size increase.
Remediation
There is no fixed version for Ubuntu:22.04
xz-utils
.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2020-22916
- https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability
- https://tukaani.org/xz/
- https://bugzilla.redhat.com/show_bug.cgi?id=2234987
- https://bugzilla.suse.com/show_bug.cgi?id=1214590
- https://github.com/tukaani-project/xz/issues/61
- https://security-tracker.debian.org/tracker/CVE-2020-22916
- http://web.archive.org/web/20230918084612/https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability
medium severity
new
- Vulnerable module: glibc/libc-bin
- Introduced through: glibc/libc-bin@2.35-0ubuntu3.1 and glibc/libc6@2.35-0ubuntu3.1
- Fixed in: 2.35-0ubuntu3.7
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › glibc/libc-bin@2.35-0ubuntu3.1
-
Introduced through: concourse/concourse@ubuntu › glibc/libc6@2.35-0ubuntu3.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc
package and not the glibc
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
Remediation
Upgrade Ubuntu:22.04
glibc
to version 2.35-0ubuntu3.7 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-2961
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/
medium severity
- Vulnerable module: gnutls28/libgnutls30
- Introduced through: gnutls28/libgnutls30@3.7.3-4ubuntu1.2
- Fixed in: 3.7.3-4ubuntu1.5
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › gnutls28/libgnutls30@3.7.3-4ubuntu1.2
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnutls28
package and not the gnutls28
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.
Remediation
Upgrade Ubuntu:22.04
gnutls28
to version 3.7.3-4ubuntu1.5 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-28834
- https://access.redhat.com/security/cve/CVE-2024-28834
- https://bugzilla.redhat.com/show_bug.cgi?id=2269228
- https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
- https://people.redhat.com/~hkario/marvin/
- https://access.redhat.com/errata/RHSA-2024:1784
- https://minerva.crocs.fi.muni.cz/
- https://access.redhat.com/errata/RHSA-2024:1879
medium severity
- Vulnerable module: gnutls28/libgnutls30
- Introduced through: gnutls28/libgnutls30@3.7.3-4ubuntu1.2
- Fixed in: 3.7.3-4ubuntu1.5
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › gnutls28/libgnutls30@3.7.3-4ubuntu1.2
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnutls28
package and not the gnutls28
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command.
Remediation
Upgrade Ubuntu:22.04
gnutls28
to version 3.7.3-4ubuntu1.5 or higher.
References
medium severity
- Vulnerable module: krb5/libgssapi-krb5-2
- Introduced through: krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1, krb5/libk5crypto3@1.19.2-2ubuntu0.1 and others
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libk5crypto3@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libkrb5-3@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libkrb5support0@1.19.2-2ubuntu0.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5
package and not the krb5
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.
Remediation
There is no fixed version for Ubuntu:22.04
krb5
.
References
medium severity
- Vulnerable module: krb5/libgssapi-krb5-2
- Introduced through: krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1, krb5/libk5crypto3@1.19.2-2ubuntu0.1 and others
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libk5crypto3@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libkrb5-3@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libkrb5support0@1.19.2-2ubuntu0.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5
package and not the krb5
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.
Remediation
There is no fixed version for Ubuntu:22.04
krb5
.
References
medium severity
- Vulnerable module: krb5/libgssapi-krb5-2
- Introduced through: krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1, krb5/libk5crypto3@1.19.2-2ubuntu0.1 and others
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libk5crypto3@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libkrb5-3@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libkrb5support0@1.19.2-2ubuntu0.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5
package and not the krb5
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.
Remediation
There is no fixed version for Ubuntu:22.04
krb5
.
References
medium severity
- Vulnerable module: libgcrypt20
- Introduced through: libgcrypt20@1.9.4-3ubuntu3
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › libgcrypt20@1.9.4-3ubuntu3
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcrypt20
package and not the libgcrypt20
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.
Remediation
There is no fixed version for Ubuntu:22.04
libgcrypt20
.
References
medium severity
- Vulnerable module: tar
- Introduced through: tar@1.34+dfsg-1ubuntu0.1.22.04.1
- Fixed in: 1.34+dfsg-1ubuntu0.1.22.04.2
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › tar@1.34+dfsg-1ubuntu0.1.22.04.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar
package and not the tar
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c.
Remediation
Upgrade Ubuntu:22.04
tar
to version 1.34+dfsg-1ubuntu0.1.22.04.2 or higher.
References
medium severity
new
- Vulnerable module: util-linux
- Introduced through: util-linux@2.37.2-4ubuntu3, util-linux/libblkid1@2.37.2-4ubuntu3 and others
- Fixed in: 2.37.2-4ubuntu3.3
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › util-linux@2.37.2-4ubuntu3
-
Introduced through: concourse/concourse@ubuntu › util-linux/libblkid1@2.37.2-4ubuntu3
-
Introduced through: concourse/concourse@ubuntu › util-linux/libmount1@2.37.2-4ubuntu3
-
Introduced through: concourse/concourse@ubuntu › util-linux/libsmartcols1@2.37.2-4ubuntu3
-
Introduced through: concourse/concourse@ubuntu › util-linux/libuuid1@2.37.2-4ubuntu3
-
Introduced through: concourse/concourse@ubuntu › util-linux/mount@2.37.2-4ubuntu3
NVD Description
Note: Versions mentioned in the description apply only to the upstream util-linux
package and not the util-linux
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
Remediation
Upgrade Ubuntu:22.04
util-linux
to version 2.37.2-4ubuntu3.3 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-28085
- https://github.com/skyler-ferrante/CVE-2024-28085
- https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq
- https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/
- https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt
- https://www.openwall.com/lists/oss-security/2024/03/27/5
- https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html
low severity
- Vulnerable module: perl/perl-base
- Introduced through: perl/perl-base@5.34.0-3ubuntu1.1
- Fixed in: 5.34.0-3ubuntu1.3
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › perl/perl-base@5.34.0-3ubuntu1.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream perl
package and not the perl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.
Remediation
Upgrade Ubuntu:22.04
perl
to version 5.34.0-3ubuntu1.3 or higher.
References
low severity
- Vulnerable module: glibc/libc-bin
- Introduced through: glibc/libc-bin@2.35-0ubuntu3.1 and glibc/libc6@2.35-0ubuntu3.1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › glibc/libc-bin@2.35-0ubuntu3.1
-
Introduced through: concourse/concourse@ubuntu › glibc/libc6@2.35-0ubuntu3.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc
package and not the glibc
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.
Remediation
There is no fixed version for Ubuntu:22.04
glibc
.
References
low severity
- Vulnerable module: krb5/libgssapi-krb5-2
- Introduced through: krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1, krb5/libk5crypto3@1.19.2-2ubuntu0.1 and others
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › krb5/libgssapi-krb5-2@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libk5crypto3@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libkrb5-3@1.19.2-2ubuntu0.1
-
Introduced through: concourse/concourse@ubuntu › krb5/libkrb5support0@1.19.2-2ubuntu0.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5
package and not the krb5
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.
Remediation
There is no fixed version for Ubuntu:22.04
krb5
.
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
- https://security-tracker.debian.org/tracker/CVE-2018-5709
- https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2018-5709
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
low severity
- Vulnerable module: libzstd/libzstd1
- Introduced through: libzstd/libzstd1@1.4.8+dfsg-3build1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › libzstd/libzstd1@1.4.8+dfsg-3build1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libzstd
package and not the libzstd
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.
Remediation
There is no fixed version for Ubuntu:22.04
libzstd
.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-4899
- https://github.com/facebook/zstd/issues/3200
- https://security.netapp.com/advisory/ntap-20230725-0005/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
low severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.9
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A security vulnerability has been identified in all supported versions
of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.
Policy processing is disabled by default but can be enabled by passing
the -policy' argument to the command line utilities or by calling the
X509_VERIFY_PARAM_set1_policies()' function.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.9 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-0464
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2dcd4f1e3115f38cefa43e3efbe9b801c27e642e
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=879f7080d7e141f415c79eaa3a8ac4a3dad0348b
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1
- https://www.openssl.org/news/secadv/20230322.txt
- https://www.debian.org/security/2023/dsa-5417
- https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
- https://www.couchbase.com/alerts/
- https://security.gentoo.org/glsa/202402-08
low severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.9
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup.
Policy processing is enabled by passing the -policy' argument to the command line utilities or by calling the
X509_VERIFY_PARAM_set1_policies()' function.
Update (31 March 2023): The description of the policy processing enablement was corrected based on CVE-2023-0466.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.9 or higher.
References
low severity
- Vulnerable module: pcre3/libpcre3
- Introduced through: pcre3/libpcre3@2:8.39-13ubuntu0.22.04.1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › pcre3/libpcre3@2:8.39-13ubuntu0.22.04.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream pcre3
package and not the pcre3
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.
Remediation
There is no fixed version for Ubuntu:22.04
pcre3
.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-11164
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
- https://security-tracker.debian.org/tracker/CVE-2017-11164
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- http://openwall.com/lists/oss-security/2017/07/11/3
- http://www.securityfocus.com/bid/99575
- http://www.openwall.com/lists/oss-security/2023/04/11/1
- http://www.openwall.com/lists/oss-security/2023/04/12/1
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
low severity
- Vulnerable module: ncurses/libncurses6
- Introduced through: ncurses/libncurses6@6.3-2, ncurses/libncursesw6@6.3-2 and others
- Fixed in: 6.3-2ubuntu0.1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › ncurses/libncurses6@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/libncursesw6@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/libtinfo6@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/ncurses-base@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/ncurses-bin@6.3-2
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses
package and not the ncurses
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.
Remediation
Upgrade Ubuntu:22.04
ncurses
to version 6.3-2ubuntu0.1 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-29458
- https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
- https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
- https://support.apple.com/kb/HT213488
- https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html
- http://seclists.org/fulldisclosure/2022/Oct/41
- http://seclists.org/fulldisclosure/2022/Oct/28
low severity
- Vulnerable module: coreutils
- Introduced through: coreutils@8.32-4.1ubuntu1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › coreutils@8.32-4.1ubuntu1
NVD Description
Note: Versions mentioned in the description apply only to the upstream coreutils
package and not the coreutils
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Remediation
There is no fixed version for Ubuntu:22.04
coreutils
.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2781
- https://security-tracker.debian.org/tracker/CVE-2016-2781
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- http://www.openwall.com/lists/oss-security/2016/02/28/2
- http://www.openwall.com/lists/oss-security/2016/02/28/3
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
low severity
- Vulnerable module: ncurses/libncurses6
- Introduced through: ncurses/libncurses6@6.3-2, ncurses/libncursesw6@6.3-2 and others
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › ncurses/libncurses6@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/libncursesw6@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/libtinfo6@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/ncurses-base@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/ncurses-bin@6.3-2
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses
package and not the ncurses
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().
Remediation
There is no fixed version for Ubuntu:22.04
ncurses
.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-50495
- https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
- https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
- https://security.netapp.com/advisory/ntap-20240119-0008/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
low severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.14
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions.
Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences.
The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions.
The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However unless the compiler uses the vector registers for storing pointers, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service.
The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3. If this cipher is enabled on the server a malicious client can influence whether this AEAD cipher is used. This implies that TLS server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.14 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-6129
- https://github.com/openssl/openssl/commit/050d26383d4e264966fb83428e72d5d48f402d35
- https://github.com/openssl/openssl/commit/5b139f95c9a47a55a0c54100f3837b1eee942b04
- https://github.com/openssl/openssl/commit/f3fc5808fe9ff74042d639839610d03b8fdcc015
- https://www.openssl.org/news/secadv/20240109.txt
- http://www.openwall.com/lists/oss-security/2024/01/09/1
- https://security.netapp.com/advisory/ntap-20240216-0009/
low severity
- Vulnerable module: glibc/libc-bin
- Introduced through: glibc/libc-bin@2.35-0ubuntu3.1 and glibc/libc6@2.35-0ubuntu3.1
- Fixed in: 2.35-0ubuntu3.5
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › glibc/libc-bin@2.35-0ubuntu3.1
-
Introduced through: concourse/concourse@ubuntu › glibc/libc6@2.35-0ubuntu3.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc
package and not the glibc
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
Remediation
Upgrade Ubuntu:22.04
glibc
to version 2.35-0ubuntu3.5 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-4813
- https://access.redhat.com/security/cve/CVE-2023-4813
- https://bugzilla.redhat.com/show_bug.cgi?id=2237798
- http://www.openwall.com/lists/oss-security/2023/10/03/8
- https://access.redhat.com/errata/RHSA-2023:5453
- https://access.redhat.com/errata/RHSA-2023:5455
- https://security.netapp.com/advisory/ntap-20231110-0003/
- https://access.redhat.com/errata/RHSA-2023:7409
low severity
- Vulnerable module: glibc/libc-bin
- Introduced through: glibc/libc-bin@2.35-0ubuntu3.1 and glibc/libc6@2.35-0ubuntu3.1
- Fixed in: 2.35-0ubuntu3.5
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › glibc/libc-bin@2.35-0ubuntu3.1
-
Introduced through: concourse/concourse@ubuntu › glibc/libc6@2.35-0ubuntu3.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc
package and not the glibc
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the nss_gethostbyname2_r and nss_getcanonname_r hooks without implementing the nss*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
Remediation
Upgrade Ubuntu:22.04
glibc
to version 2.35-0ubuntu3.5 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-4806
- https://access.redhat.com/security/cve/CVE-2023-4806
- https://bugzilla.redhat.com/show_bug.cgi?id=2237782
- http://www.openwall.com/lists/oss-security/2023/10/03/4
- http://www.openwall.com/lists/oss-security/2023/10/03/5
- http://www.openwall.com/lists/oss-security/2023/10/03/6
- http://www.openwall.com/lists/oss-security/2023/10/03/8
- https://security.gentoo.org/glsa/202310-03
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/
- https://access.redhat.com/errata/RHSA-2023:5453
- https://access.redhat.com/errata/RHSA-2023:5455
- https://access.redhat.com/errata/RHSA-2023:7409
- https://security.netapp.com/advisory/ntap-20240125-0008/
low severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.10
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash.
Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption.
The AES-XTS cipher decryption implementation for 64 bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16 byte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is unmapped, this will trigger a crash which results in a denial of service.
If an attacker can control the size and location of the ciphertext buffer being decrypted by an application using AES-XTS on 64 bit ARM, the application is affected. This is fairly unlikely making this issue a Low severity one.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.10 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-1255
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bc2f61ad70971869b242fc1cb445b98bad50074a
- https://www.openssl.org/news/secadv/20230419.txt
- http://www.openwall.com/lists/oss-security/2023/04/20/13
- https://security.netapp.com/advisory/ntap-20230908-0006/
low severity
- Vulnerable module: systemd/libsystemd0
- Introduced through: systemd/libsystemd0@249.11-0ubuntu3.7 and systemd/libudev1@249.11-0ubuntu3.7
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › systemd/libsystemd0@249.11-0ubuntu3.7
-
Introduced through: concourse/concourse@ubuntu › systemd/libudev1@249.11-0ubuntu3.7
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd
package and not the systemd
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.
Remediation
There is no fixed version for Ubuntu:22.04
systemd
.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-7008
- https://access.redhat.com/security/cve/CVE-2023-7008
- https://bugzilla.redhat.com/show_bug.cgi?id=2222261
- https://bugzilla.redhat.com/show_bug.cgi?id=2222672
- https://github.com/systemd/systemd/issues/25676
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHNBXGKJWISJETTTDTZKTBFIBJUOSLKL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GMDEG5PKONWNHOEYSUDRT6JEOISRMN2/
low severity
- Vulnerable module: gcc-12/gcc-12-base
- Introduced through: gcc-12/gcc-12-base@12.1.0-2ubuntu1~22.04, gcc-12/libgcc-s1@12.1.0-2ubuntu1~22.04 and others
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › gcc-12/gcc-12-base@12.1.0-2ubuntu1~22.04
-
Introduced through: concourse/concourse@ubuntu › gcc-12/libgcc-s1@12.1.0-2ubuntu1~22.04
-
Introduced through: concourse/concourse@ubuntu › gcc-12/libstdc++6@12.1.0-2ubuntu1~22.04
NVD Description
Note: Versions mentioned in the description apply only to the upstream gcc-12
package and not the gcc-12
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
Remediation
There is no fixed version for Ubuntu:22.04
gcc-12
.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-27943
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
- https://sourceware.org/bugzilla/show_bug.cgi?id=28995
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
low severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.14
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack
Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly.
A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue.
OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass().
We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant.
The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.14 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-0727
- https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2
- https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a
- https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c
- https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8
- https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539
- https://www.openssl.org/news/secadv/20240125.txt
- https://security.netapp.com/advisory/ntap-20240208-0006/
low severity
- Vulnerable module: shadow/login
- Introduced through: shadow/login@1:4.8.1-2ubuntu2.1 and shadow/passwd@1:4.8.1-2ubuntu2.1
- Fixed in: 1:4.8.1-2ubuntu2.2
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › shadow/login@1:4.8.1-2ubuntu2.1
-
Introduced through: concourse/concourse@ubuntu › shadow/passwd@1:4.8.1-2ubuntu2.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream shadow
package and not the shadow
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
Remediation
Upgrade Ubuntu:22.04
shadow
to version 1:4.8.1-2ubuntu2.2 or higher.
References
low severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.12
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Issue summary: Checking excessively long DH keys or parameters may be very slow.
Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.
The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p.
An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.
The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().
Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option.
The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.12 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-3817
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5
- https://www.openssl.org/news/secadv/20230731.txt
- http://www.openwall.com/lists/oss-security/2023/07/31/1
- http://seclists.org/fulldisclosure/2023/Jul/43
- https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html
- https://security.netapp.com/advisory/ntap-20230818-0014/
- http://www.openwall.com/lists/oss-security/2023/09/22/9
- http://www.openwall.com/lists/oss-security/2023/09/22/11
- https://security.netapp.com/advisory/ntap-20231027-0008/
- http://www.openwall.com/lists/oss-security/2023/11/06/2
- https://security.gentoo.org/glsa/202402-08
low severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.12
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence.
Impact summary: Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be mislead by removing adding or reordering such empty entries as these are ignored by the OpenSSL implementation. We are currently unaware of any such applications.
The AES-SIV algorithm allows for authentication of multiple associated data entries along with the encryption. To authenticate empty data the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL just returns success for such a call instead of performing the associated data authentication operation. The empty data thus will not be authenticated.
As this issue does not affect non-empty associated data authentication and we expect it to be rare for an application to use empty associated data entries this is qualified as Low severity issue.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.12 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-2975
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc
- https://www.openssl.org/news/secadv/20230714.txt
- http://www.openwall.com/lists/oss-security/2023/07/15/1
- http://www.openwall.com/lists/oss-security/2023/07/19/5
- https://security.netapp.com/advisory/ntap-20230725-0004/
- https://security.gentoo.org/glsa/202402-08
low severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.9
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification.
As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function.
Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument.
Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.9 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-0466
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0d16b7e99aafc0b4a6d729eec65a411a7e025f0a
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=73398dea26de9899fb4baa94098ad0a61f435c72
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc814a30fc4f0bc54fcea7d9a7462f5457aab061
- https://www.openssl.org/news/secadv/20230328.txt
- https://security.netapp.com/advisory/ntap-20230414-0001/
- https://www.debian.org/security/2023/dsa-5417
- https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
- http://www.openwall.com/lists/oss-security/2023/09/28/4
- https://security.gentoo.org/glsa/202402-08
low severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.9
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks.
Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether.
Policy processing is disabled by default but can be enabled by passing
the -policy' argument to the command line utilities or by calling the
X509_VERIFY_PARAM_set1_policies()' function.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.9 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-0465
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b013765abfa80036dc779dd0e50602c57bb3bf95
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=facfb1ab745646e97a1920977ae4a9965ea61d5c
- https://www.openssl.org/news/secadv/20230328.txt
- https://security.netapp.com/advisory/ntap-20230414-0001/
- https://www.debian.org/security/2023/dsa-5417
- https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
- https://security.gentoo.org/glsa/202402-08
low severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.14
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow.
Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.
While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters.
Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q.
An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.
DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().
Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application.
The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.14 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-5678
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6
- https://www.openssl.org/news/secadv/20231106.txt
- http://www.openwall.com/lists/oss-security/2023/11/06/2
- https://security.netapp.com/advisory/ntap-20231130-0010/
low severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.12
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Issue summary: Checking excessively long DH keys or parameters may be very slow.
Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.
The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length.
However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large.
An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack.
The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().
Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the '-check' option.
The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.12 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-3446
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23
- https://www.openssl.org/news/secadv/20230719.txt
- http://www.openwall.com/lists/oss-security/2023/07/19/4
- http://www.openwall.com/lists/oss-security/2023/07/19/5
- http://www.openwall.com/lists/oss-security/2023/07/19/6
- http://www.openwall.com/lists/oss-security/2023/07/31/1
- https://security.netapp.com/advisory/ntap-20230803-0011/
- https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html
- https://security.gentoo.org/glsa/202402-08
low severity
- Vulnerable module: gnupg2/gpgv
- Introduced through: gnupg2/gpgv@2.2.27-3ubuntu2.1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › gnupg2/gpgv@2.2.27-3ubuntu2.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2
package and not the gnupg2
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
Remediation
There is no fixed version for Ubuntu:22.04
gnupg2
.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-3219
- https://access.redhat.com/security/cve/CVE-2022-3219
- https://bugzilla.redhat.com/show_bug.cgi?id=2127010
- https://dev.gnupg.org/D556
- https://dev.gnupg.org/T5993
- https://marc.info/?l=oss-security&m=165696590211434&w=4
- https://security.netapp.com/advisory/ntap-20230324-0001/
low severity
- Vulnerable module: libcap2
- Introduced through: libcap2@1:2.44-1build3, libcap2/libcap2-bin@1:2.44-1build3 and others
- Fixed in: 1:2.44-1ubuntu0.22.04.1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › libcap2@1:2.44-1build3
-
Introduced through: concourse/concourse@ubuntu › libcap2/libcap2-bin@1:2.44-1build3
-
Introduced through: concourse/concourse@ubuntu › libcap2/libpam-cap@1:2.44-1build3
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcap2
package and not the libcap2
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.
Remediation
Upgrade Ubuntu:22.04
libcap2
to version 1:2.44-1ubuntu0.22.04.1 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-2602
- https://bugzilla.redhat.com/show_bug.cgi?id=2209114
- https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/
low severity
- Vulnerable module: procps
- Introduced through: procps@2:3.3.17-6ubuntu2 and procps/libprocps8@2:3.3.17-6ubuntu2
- Fixed in: 2:3.3.17-6ubuntu2.1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › procps@2:3.3.17-6ubuntu2
-
Introduced through: concourse/concourse@ubuntu › procps/libprocps8@2:3.3.17-6ubuntu2
NVD Description
Note: Versions mentioned in the description apply only to the upstream procps
package and not the procps
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.
Remediation
Upgrade Ubuntu:22.04
procps
to version 2:3.3.17-6ubuntu2.1 or higher.
References
low severity
- Vulnerable module: shadow/login
- Introduced through: shadow/login@1:4.8.1-2ubuntu2.1 and shadow/passwd@1:4.8.1-2ubuntu2.1
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › shadow/login@1:4.8.1-2ubuntu2.1
-
Introduced through: concourse/concourse@ubuntu › shadow/passwd@1:4.8.1-2ubuntu2.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream shadow
package and not the shadow
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
Remediation
There is no fixed version for Ubuntu:22.04
shadow
.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-29383
- https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d
- https://github.com/shadow-maint/shadow/pull/687
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797
low severity
- Vulnerable module: ncurses/libncurses6
- Introduced through: ncurses/libncurses6@6.3-2, ncurses/libncursesw6@6.3-2 and others
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › ncurses/libncurses6@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/libncursesw6@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/libtinfo6@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/ncurses-base@6.3-2
-
Introduced through: concourse/concourse@ubuntu › ncurses/ncurses-bin@6.3-2
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses
package and not the ncurses
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c.
Remediation
There is no fixed version for Ubuntu:22.04
ncurses
.
References
low severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.8 and openssl/libssl3@3.0.2-0ubuntu1.8
- Fixed in: 3.0.2-0ubuntu1.14
Detailed paths
-
Introduced through: concourse/concourse@ubuntu › openssl@3.0.2-0ubuntu1.8
-
Introduced through: concourse/concourse@ubuntu › openssl/libssl3@3.0.2-0ubuntu1.8
NVD Description
This vulnerability has not been analyzed by NVD yet.
Remediation
Upgrade Ubuntu:22.04
openssl
to version 3.0.2-0ubuntu1.14 or higher.