Your submission was sent successfully! Close

USN-3692-1: OpenSSL vulnerabilities

26 June 2018

Several security issues were fixed in OpenSSL.

Releases

Packages

  • openssl - Secure Socket Layer (SSL) cryptographic library and tools
  • openssl1.0 - Secure Socket Layer (SSL) cryptographic library and tools

Details

Keegan Ryan discovered that OpenSSL incorrectly handled ECDSA key
generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private ECDSA keys. (CVE-2018-0495)

Guido Vranken discovered that OpenSSL incorrectly handled very large prime
values during a key agreement. A remote attacker could possibly use this
issue to consume resources, leading to a denial of service. (CVE-2018-0732)

Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis
Manuel Alvarez Tapia discovered that OpenSSL incorrectly handled RSA key
generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private RSA keys. (CVE-2018-0737)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04
Ubuntu 17.10
Ubuntu 16.04
Ubuntu 14.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

Related notices

  • USN-3689-2: libgcrypt11
  • USN-3850-1: nss, libnss3-nssdb, libnss3-1d, libnss3-dev, libnss3, libnss3-tools
  • USN-3692-2: openssl, libssl1.0.0
  • USN-3850-2: nss, libnss3
  • USN-3628-2: openssl, libssl1.0.0
  • USN-3628-1: libssl1.0.0-udeb, libssl-dev, libssl1.0.0, libcrypto1.0.0-udeb, openssl, libssl-doc
  • USN-3689-1: libgcrypt11, libgcrypt11-udeb, libgcrypt20-dev, libgcrypt11-doc, libgcrypt20-doc, libgcrypt11-dev, libgcrypt-mingw-w64-dev, libgcrypt20-udeb, libgcrypt20