USN-3692-1: OpenSSL vulnerabilities
26 June 2018
Several security issues were fixed in OpenSSL.
Releases
Packages
- openssl - Secure Socket Layer (SSL) cryptographic library and tools
- openssl1.0 - Secure Socket Layer (SSL) cryptographic library and tools
Details
Keegan Ryan discovered that OpenSSL incorrectly handled ECDSA key
generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private ECDSA keys. (CVE-2018-0495)
Guido Vranken discovered that OpenSSL incorrectly handled very large prime
values during a key agreement. A remote attacker could possibly use this
issue to consume resources, leading to a denial of service. (CVE-2018-0732)
Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis
Manuel Alvarez Tapia discovered that OpenSSL incorrectly handled RSA key
generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private RSA keys. (CVE-2018-0737)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
Ubuntu 17.10
Ubuntu 16.04
Ubuntu 14.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- {'id': 'USN-3692-2', 'packages': 'openssl, libssl1.0.0'}
- {'id': 'USN-3689-2', 'packages': 'libgcrypt11'}
- {'id': 'USN-3689-1', 'packages': 'libgcrypt11-doc, libgcrypt11-udeb, libgcrypt20-doc, libgcrypt20, libgcrypt11, libgcrypt20-dev, libgcrypt-mingw-w64-dev, libgcrypt11-dev, libgcrypt20-udeb'}
- {'id': 'USN-3850-1', 'packages': 'libnss3-1d, libnss3-nssdb, libnss3-dev, libnss3, nss, libnss3-tools'}
- {'id': 'USN-3850-2', 'packages': 'libnss3, nss'}
- {'id': 'USN-3628-1', 'packages': 'openssl, libssl-doc, libssl1.0.0-udeb, libssl-dev, libssl1.0.0, libcrypto1.0.0-udeb'}
- {'id': 'USN-3628-2', 'packages': 'openssl, libssl1.0.0'}