CVE-2011-4576
Publication date 5 January 2012
Last updated 24 July 2024
Ubuntu priority
The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.
Status
Package | Ubuntu Release | Status |
---|---|---|
openssl | ||
openssl098 | ||
Patch details
Package | Patch details |
---|---|
openssl |
|
openssl098 |
|
References
Related Ubuntu Security Notices (USN)
- USN-1357-1
- OpenSSL vulnerabilities
- 9 February 2012