[USN-3899-1] OpenSSL vulnerability


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”M52BtFpqVhDN1OQqRrcyMs1Y1uNrLMg6l”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–M52BtFpqVhDN1OQqRrcyMs1Y1uNrLMg6l

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: “ubuntu-security-announce@lists.ubuntu.com”

Message-ID:
Subject: [USN-3899-1] OpenSSL vulnerability

–WjPf2bDr2R1oYXay2nM0iIADXuXJgwx0i

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3899-1
February 27, 2019

openssl, openssl1.0 vulnerability
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

OpenSSL could be made to expose sensitive information over the network.

Software Description:
– openssl1.0: Secure Socket Layer (SSL) cryptographic library and tools
– openssl: Secure Socket Layer (SSL) cryptographic library and tools

Details:

Juraj Somorovsky, Robert Merget, and Nimrod Aviram discovered that certai=
n
applications incorrectly used OpenSSL and could be exposed to a padding
oracle attack. A remote attacker could possibly use this issue to decrypt=

data.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
libssl1.0.0 1.0.2n-1ubuntu6.2

Ubuntu 18.04 LTS:
libssl1.0.0 1.0.2n-1ubuntu5.3

Ubuntu 16.04 LTS:
libssl1.0.0 1.0.2g-1ubuntu4.15

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3899-1
CVE-2019-1559

Package Information:
https://launchpad.net/ubuntu/+source/openssl1.0/1.0.2n-1ubuntu6.2
https://launchpad.net/ubuntu/+source/openssl1.0/1.0.2n-1ubuntu5.3
https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu4.15

–WjPf2bDr2R1oYXay2nM0iIADXuXJgwx0i–

–M52BtFpqVhDN1OQqRrcyMs1Y1uNrLMg6l

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=Gnrr
—–END PGP SIGNATURE—–

–M52BtFpqVhDN1OQqRrcyMs1Y1uNrLMg6l–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK