CVE-2020-1967

Priority
Description
Server or client applications that call the SSL_check_chain() function
during or after a TLS 1.3 handshake may crash due to a NULL pointer
dereference as a result of incorrect handling of the
"signature_algorithms_cert" TLS extension. The crash occurs if an invalid
or unrecognised signature algorithm is received from the peer. This could
be exploited by a malicious peer in a Denial of Service attack. OpenSSL
version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue
did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g
(Affected 1.1.1d-1.1.1f).
Assigned-to
mdeslaur
Notes
mdeslaurintroduced in 1.1.1d
Package
Source: edk2 (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (code not compiled)
Ubuntu 20.10 (Groovy Gorilla):not-affected (code not compiled)
Package
Upstream:released (1.1.1g)
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (code not present)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Ubuntu 20.04 LTS (Focal Fossa):released (1.1.1f-1ubuntu2)
Ubuntu 20.10 (Groovy Gorilla):released (1.1.1f-1ubuntu2)
Patches:
Upstream:https://github.com/openssl/openssl/commit/a87f3fe01a5a894aa27ccd6a239155fd129988e4
Upstream:https://github.com/openssl/openssl/commit/3656c08ab4b1b892730cb5e808b6f4298b08a2e6
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
More Information

Updated: 2020-07-28 20:08:17 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)