Ubuntu 4376-1: OpenSSL vulnerabilities

    Date 28 May 2020
    Posted By LinuxSecurity Advisories
    Several security issues were fixed in OpenSSL.
    Ubuntu Security Notice USN-4376-1
    May 28, 2020
    openssl vulnerabilities
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 19.10
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    Several security issues were fixed in OpenSSL.
    Software Description:
    - openssl: Secure Socket Layer (SSL) cryptographic library and tools
    Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin,
    Alejandro Cabrera Aldaya, and Billy Brumley discovered that OpenSSL
    incorrectly handled ECDSA signatures. An attacker could possibly use this
    issue to perform a timing side-channel attack and recover private ECDSA
    keys. (CVE-2019-1547)
    Matt Caswell discovered that OpenSSL incorrectly handled the random number
    generator (RNG). This may result in applications that use the fork() system
    call sharing the same RNG state between the parent and the child, contrary
    to expectations. This issue only affected Ubuntu 18.04 LTS and Ubuntu
    19.10. (CVE-2019-1549)
    Guido Vranken discovered that OpenSSL incorrectly performed the x86_64
    Montgomery squaring procedure. While unlikely, a remote attacker could
    possibly use this issue to recover private keys. (CVE-2019-1551)
    Bernd Edlinger discovered that OpenSSL incorrectly handled certain
    decryption functions. In certain scenarios, a remote attacker could
    possibly use this issue to perform a padding oracle attack and decrypt
    traffic. (CVE-2019-1563)
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 19.10:
      libssl1.1                       1.1.1c-1ubuntu4.1
    Ubuntu 18.04 LTS:
      libssl1.1                       1.1.1-1ubuntu2.1~18.04.6
    Ubuntu 16.04 LTS:
      libssl1.0.0                     1.0.2g-1ubuntu4.16
    After a standard system update you need to reboot your computer to make
    all the necessary changes.
      CVE-2019-1547, CVE-2019-1549, CVE-2019-1551, CVE-2019-1563
    Package Information:

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"7","type":"x","order":"1","pct":18.42,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"4","type":"x","order":"2","pct":10.53,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"27","type":"x","order":"3","pct":71.05,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.