USN-3692-1: OpenSSL vulnerabilities
26 June 2018
Several security issues were fixed in OpenSSL.
Releases
Packages
- openssl - Secure Socket Layer (SSL) cryptographic library and tools
- openssl1.0 - Secure Socket Layer (SSL) cryptographic library and tools
Details
Keegan Ryan discovered that OpenSSL incorrectly handled ECDSA key
generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private ECDSA keys. (CVE-2018-0495)
Guido Vranken discovered that OpenSSL incorrectly handled very large prime
values during a key agreement. A remote attacker could possibly use this
issue to consume resources, leading to a denial of service. (CVE-2018-0732)
Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis
Manuel Alvarez Tapia discovered that OpenSSL incorrectly handled RSA key
generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private RSA keys. (CVE-2018-0737)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
Ubuntu 17.10
Ubuntu 16.04
Ubuntu 14.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-3692-2: libssl1.0.0, openssl
- USN-3689-2: libgcrypt11
- USN-3689-1: libgcrypt11-udeb, libgcrypt20-udeb, libgcrypt-mingw-w64-dev, libgcrypt20-dev, libgcrypt20, libgcrypt20-doc, libgcrypt11-doc, libgcrypt11, libgcrypt11-dev
- USN-3850-1: nss, libnss3, libnss3-dev, libnss3-tools, libnss3-nssdb, libnss3-1d
- USN-3850-2: nss, libnss3
- USN-3628-1: libssl1.0.0-udeb, libcrypto1.0.0-udeb, libssl-doc, openssl, libssl-dev, libssl1.0.0
- USN-3628-2: libssl1.0.0, openssl