CVE-2012-0027
Publication date 5 January 2012
Last updated 24 July 2024
Ubuntu priority
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
Status
Package | Ubuntu Release | Status |
---|---|---|
openssl | 11.10 oneiric |
Fixed 1.0.0e-2ubuntu4.2
|
11.04 natty |
Not affected
|
|
10.10 maverick |
Not affected
|
|
10.04 LTS lucid |
Not affected
|
|
8.04 LTS hardy |
Not affected
|
|
openssl098 | 11.10 oneiric |
Not affected
|
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release |
Notes
References
Related Ubuntu Security Notices (USN)
- USN-1357-1
- OpenSSL vulnerabilities
- 9 February 2012