==========================================================================
Ubuntu Security Notice USN-3628-1
April 19, 2018
openssl vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
OpenSSL could allow access to sensitve information.
Software Description:
– openssl: Secure Socket Layer (SSL) cryptographic library and tools
Details:
Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis
Manuel Alvarez Tapia discovered that OpenSSL incorrectly handled RSA
key generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private RSA keys.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.10:
libssl1.0.0 1.0.2g-1ubuntu13.5
Ubuntu 16.04 LTS:
libssl1.0.0 1.0.2g-1ubuntu4.12
Ubuntu 14.04 LTS:
libssl1.0.0 1.0.1f-1ubuntu2.25
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3628-1
CVE-2018-0737
Package Information:
https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu13.5
https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu4.12
https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.25—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=7g2f
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3628-2
April 19, 2018
openssl vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 ESM
Summary:
OpenSSL could allow access to sensitve information.
Software Description:
– openssl: Secure Socket Layer (SSL) cryptographic library and tools
Details:
USN-3628-1 fixed a vulnerability in OpenSSL. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis
Manuel Alvarez Tapia discovered that OpenSSL incorrectly handled RSA
key generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private RSA keys.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
libssl1.0.0 1.0.1-4ubuntu5.41
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3628-2
https://usn.ubuntu.com/usn/usn-3628-1
CVE-2018-0737—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQIcBAABCAAGBQJa2M/CAAoJEEW851uECx9pFNMP/RM05A7i3NBdK6s1278FNlqU
p3UU6r2miOd62uYV7OnKgNu/VjIjOQIu7w/WFSdX4sq0Svb6HiRu8/1FQc1d0oxV
GVpkOQgaB17PYM/DOyc0/vqvZbV54GIH4tKinHdVNNMT/D3ZHi4F62OD/z2tRoUS
khLbQ5zTzSmdVQdUndINJfKTorA5xqrCRT6v96af4jmMeQResKG/8J6OSE97aOTY
lNskIZDn7ZXBQhU+E5/6S6Bh3sfL4Qj5LwpVvjI9c280zNPSlq1DcRGeZP91WT+N
ohSBp3SGjT7urm8Ut8tHqmcGCzafNDBMtp96iL4OtmZvdUvGEOmgDHB5jKHAjU95
S8qNqPWu/ugtMZefA4PCuLwL330FLASzmmPF+agIjqPoDsHP/dbYpb4dquDTBSgE
HluGZOvgNTkOQVHj7V7jkIdk5yAlxf4CUVVSMnNgd4CrvTeFO4nSlwOMRjYq9nwN
BZkyHMnmXVAAPzGU5YuAlbnlpFMtHY4d9Ip/FvSCIuvKFUyZsOi4HoLq5y0t3LGW
NRhvquVqvggY/Jb7/VT2WtDcwvL2Np5kgcKgtSWy2KDP4u3S+3jHwGWOl7Y3cakx
iNbxaKNGlL+Ol1xO9hEP6d5Px4SNzcedmGarv8kDuQ0vwSwdqD9bKqQ2wXiggfkY
VUk596tNXCswKjtIMB5L
=wop7
—–END PGP SIGNATURE—–
—