[USN-3692-2] OpenSSL vulnerabilities


–===============0256470229397854116==
Content-Type: multipart/signed; micalg=”pgp-sha256″;
protocol=”application/pgp-signature”; boundary=”=-k4MXSkrbZHo9J3rWqdwO”

–=-k4MXSkrbZHo9J3rWqdwO
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3692-2
June 26, 2018

openssl vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in OpenSSL.

Software Description:
– openssl: Secure Socket Layer (SSL) cryptographic library and tools

Details:

USN-3692-1 fixed a vulnerability in OpenSSL. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0Keegan Ryan discovered that OpenSSL incorrectly handled ECDSA key
=C2=A0generation. An attacker could possibly use this issue to perform a
=C2=A0cache-timing attack and recover private ECDSA keys. (CVE-2018-0495)

=C2=A0Guido Vranken discovered that OpenSSL incorrectly handled very large
=C2=A0prime values during a key agreement. A remote attacker could possibly
=C2=A0use this issue to consume resources, leading to a denial of service.
=C2=A0(CVE-2018-0732)

=C2=A0Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Lui=
s
=C2=A0Manuel Alvarez Tapia discovered that OpenSSL incorrectly handled RSA
=C2=A0key generation. An attacker could possibly use this issue to perform =
a
=C2=A0cache-timing attack and recover private RSA keys. (CVE-2018-0737)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 libssl1.0.0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A01.0.1-=
4ubuntu5.43

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3692-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3692-1
=C2=A0 CVE-2017-0737, CVE-2018-0495, CVE-2018-0732, CVE-2018-0737
–=-k4MXSkrbZHo9J3rWqdwO
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=d4c3
—–END PGP SIGNATURE—–

–=-k4MXSkrbZHo9J3rWqdwO–

–===============0256470229397854116==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============0256470229397854116==–