USN-3692-2: OpenSSL vulnerabilities

26 June 2018

Several security issues were fixed in OpenSSL.

Releases

Packages

  • openssl - Secure Socket Layer (SSL) cryptographic library and tools

Details

USN-3692-1 fixed a vulnerability in OpenSSL. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Keegan Ryan discovered that OpenSSL incorrectly handled ECDSA key
generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private ECDSA keys. (CVE-2018-0495)

Guido Vranken discovered that OpenSSL incorrectly handled very large prime
values during a key agreement. A remote attacker could possibly use this
issue to consume resources, leading to a denial of service. (CVE-2018-0732)

Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis
Manuel Alvarez Tapia discovered that OpenSSL incorrectly handled RSA key
generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private RSA keys. (CVE-2018-0737)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

Related notices

  • USN-3689-2: libgcrypt11
  • USN-3850-1: libnss3, libnss3-nssdb, nss, libnss3-dev, libnss3-1d, libnss3-tools
  • USN-3692-1: libssl1.0.0, libssl1.0-dev, libssl1.0.0-udeb, libcrypto1.1-udeb, libssl1.1-udeb, libssl1.1, libssl-doc, libssl-dev, openssl1.0, openssl, libcrypto1.0.0-udeb
  • USN-3850-2: libnss3, nss
  • USN-3628-2: openssl, libssl1.0.0
  • USN-3628-1: libssl1.0.0, libssl1.0.0-udeb, libssl-doc, libssl-dev, openssl, libcrypto1.0.0-udeb
  • USN-3689-1: libgcrypt-mingw-w64-dev, libgcrypt11-udeb, libgcrypt11-dev, libgcrypt20-dev, libgcrypt11-doc, libgcrypt20-doc, libgcrypt20, libgcrypt20-udeb, libgcrypt11