You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa openssl

Sigurnosni nedostaci programskog paketa openssl

==========================================================================
Ubuntu Security Notice USN-3475-1
November 06, 2017

openssl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 17.10
– Ubuntu 17.04
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in OpenSSL.

Software Description:
– openssl: Secure Socket Layer (SSL) cryptographic library and tools

Details:

It was discovered that OpenSSL incorrectly parsed the IPAddressFamily
extension in X.509 certificates, resulting in an erroneous display of the
certificate in text format. (CVE-2017-3735)

It was discovered that OpenSSL incorrectly performed the x86_64 Montgomery
squaring procedure. While unlikely, a remote attacker could possibly use
this issue to recover private keys. This issue only applied to Ubuntu 16.04
LTS, Ubuntu 16.10 and Ubuntu 17.04. (CVE-2017-3736)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
libssl1.0.0 1.0.2g-1ubuntu13.2

Ubuntu 17.04:
libssl1.0.0 1.0.2g-1ubuntu11.3

Ubuntu 16.04 LTS:
libssl1.0.0 1.0.2g-1ubuntu4.9

Ubuntu 14.04 LTS:
libssl1.0.0 1.0.1f-1ubuntu2.23

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3475-1
CVE-2017-3735, CVE-2017-3736

Package Information:
https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu13.2
https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu11.3
https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu4.9
https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.23

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=LorH
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa Red Hat JBoss Enterprise Application Platform

Otkriven je sigurnosni nedostatak u programskom paketu Red Hat JBoss Enterprise Application Platform. Otkriveni nedostatak nalazio u programskoj biblioteki s...

Close