USN-4376-2: OpenSSL vulnerabilities
9 July 2020
Several security issues were fixed in OpenSSL.
Releases
Packages
- openssl - Secure Socket Layer (SSL) cryptographic library and tools
Details
USN-4376-1 fixed several vulnerabilities in OpenSSL. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
Cesar Pereida GarcĂa, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin,
Alejandro Cabrera Aldaya, and Billy Brumley discovered that OpenSSL
incorrectly handled ECDSA signatures. An attacker could possibly use this
issue to perform a timing side-channel attack and recover private ECDSA
keys. (CVE-2019-1547)
Juraj Somorovsky, Robert Merget, and Nimrod Aviram discovered that certain
applications incorrectly used OpenSSL and could be exposed to a padding
oracle attack. A remote attacker could possibly use this issue to decrypt
data. (CVE-2019-1559)
Bernd Edlinger discovered that OpenSSL incorrectly handled certain
decryption functions. In certain scenarios, a remote attacker could
possibly use this issue to perform a padding oracle attack and decrypt
traffic. (CVE-2019-1563)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
Ubuntu 12.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-4376-1: libssl1.1-udeb, libssl1.1, libssl-doc, libssl1.0.0, libcrypto1.1-udeb, libssl1.0.0-udeb, libcrypto1.0.0-udeb, libssl-dev, openssl
- USN-4504-1: libssl1.0-dev, libssl-doc, libssl1.0.0, libssl1.0.0-udeb, libcrypto1.0.0-udeb, libssl-dev, openssl1.0, openssl
- USN-3899-1: libssl1.0-dev, libssl-doc, libssl1.0.0, libssl1.0.0-udeb, libcrypto1.0.0-udeb, libssl-dev, openssl1.0, openssl