First published: Thu Jul 09 2020(Updated: )
USN-4376-1 fixed several vulnerabilities in OpenSSL. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, and Billy Brumley discovered that OpenSSL incorrectly handled ECDSA signatures. An attacker could possibly use this issue to perform a timing side-channel attack and recover private ECDSA keys. (CVE-2019-1547) Juraj Somorovsky, Robert Merget, and Nimrod Aviram discovered that certain applications incorrectly used OpenSSL and could be exposed to a padding oracle attack. A remote attacker could possibly use this issue to decrypt data. (CVE-2019-1559) Bernd Edlinger discovered that OpenSSL incorrectly handled certain decryption functions. In certain scenarios, a remote attacker could possibly use this issue to perform a padding oracle attack and decrypt traffic. (CVE-2019-1563)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssl1.0.0 | <1.0.1f-1ubuntu2.27+esm1 | 1.0.1f-1ubuntu2.27+esm1 |
=14.04 | ||
All of | ||
ubuntu/libssl1.0.0 | <1.0.1-4ubuntu5.44 | 1.0.1-4ubuntu5.44 |
=12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-4376-2 fixes multiple vulnerabilities in OpenSSL, including CVE-2019-1547, CVE-2019-1559, and CVE-2019-1563.
Yes, Ubuntu 12.04 ESM is affected by USN-4376-2.
Yes, Ubuntu 14.04 ESM is affected by USN-4376-2.
To fix the OpenSSL vulnerabilities in Ubuntu 12.04 ESM, you should update the libssl1.0.0 package to version 1.0.1-4ubuntu5.44.
To fix the OpenSSL vulnerabilities in Ubuntu 14.04 ESM, you should update the libssl1.0.0 package to version 1.0.1f-1ubuntu2.27+esm1.