Package "openssl"
Name: |
openssl
|
Description: |
Secure Sockets Layer toolkit - cryptographic utility
|
Latest version: |
1.0.2g-1ubuntu4.20 |
Release: |
xenial (16.04) |
Level: |
updates |
Repository: |
main |
Links
Download "openssl"
Other versions of "openssl" in Xenial
Packages in group
Deleted packages are displayed in grey.
Changelog
openssl (1.0.2g-1ubuntu4.15) xenial-security; urgency=medium
* SECURITY UPDATE: 0-byte record padding oracle
- debian/patches/CVE-2019-1559.patch: go into the error state if a
fatal alert is sent or received in ssl/d1_pkt.c, ssl/s3_pkt.c.
- CVE-2019-1559
-- Marc Deslauriers <email address hidden> Tue, 26 Feb 2019 13:16:01 -0500
|
Source diff to previous version |
|
openssl (1.0.2g-1ubuntu4.14) xenial-security; urgency=medium
* SECURITY UPDATE: PortSmash side channel attack
- debian/patches/CVE-2018-5407.patch: fix timing vulnerability in
crypto/bn/bn_lib.c, crypto/ec/ec_mult.c.
- CVE-2018-5407
* SECURITY UPDATE: timing side channel attack in DSA
- debian/patches/CVE-2018-0734-pre1.patch: address a timing side
channel in crypto/dsa/dsa_ossl.c.
- debian/patches/CVE-2018-0734-1.patch: fix timing vulnerability in
crypto/dsa/dsa_ossl.c.
- debian/patches/CVE-2018-0734-2.patch: fix mod inverse in
crypto/dsa/dsa_ossl.c.
- debian/patches/CVE-2018-0734-3.patch: add a constant time flag in
crypto/dsa/dsa_ossl.c.
- CVE-2018-0734
-- Marc Deslauriers <email address hidden> Tue, 04 Dec 2018 08:38:18 -0500
|
Source diff to previous version |
CVE-2018-5407 |
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing at |
CVE-2018-0734 |
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing |
|
openssl (1.0.2g-1ubuntu4.13) xenial-security; urgency=medium
* SECURITY UPDATE: ECDSA key extraction side channel
- debian/patches/CVE-2018-0495.patch: add blinding to an ECDSA
signature in crypto/ecdsa/ecdsatest.c, crypto/ecdsa/ecs_ossl.c.
- CVE-2018-0495
* SECURITY UPDATE: denial of service via long prime values
- debian/patches/CVE-2018-0732.patch: reject excessively large primes
in DH key generation in crypto/dh/dh_key.c.
- CVE-2018-0732
* SECURITY UPDATE: RSA cache timing side channel attack
(previous update was incomplete)
- debian/patches/CVE-2018-0737-1.patch: replaced variable-time GCD in
crypto/rsa/rsa_gen.c.
- debian/patches/CVE-2018-0737-2.patch: used ERR set/pop mark in
crypto/rsa/rsa_gen.c.
- debian/patches/CVE-2018-0737-3.patch: consttime flag changed in
crypto/rsa/rsa_gen.c.
- debian/patches/CVE-2018-0737-4.patch: ensure BN_mod_inverse and
BN_mod_exp_mont both get called with BN_FLG_CONSTTIME flag set in
crypto/rsa/rsa_gen.c.
- CVE-2018-0737
-- Marc Deslauriers <email address hidden> Wed, 20 Jun 2018 07:38:22 -0400
|
Source diff to previous version |
CVE-2018-0495 |
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of |
CVE-2018-0732 |
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will |
CVE-2018-0737 |
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to |
|
openssl (1.0.2g-1ubuntu4.12) xenial-security; urgency=medium
* SECURITY UPDATE: Cache timing side channel
- debian/patches/CVE-2018-0737.patch: ensure BN_mod_inverse
and BN_mod_exp_mont get called with BN_FLG_CONSTTIME flag set
in crypto/rsa/rsa_gen.c.
- CVE-2018-0737
-- <email address hidden> (Leonidas S. Barbosa) Wed, 18 Apr 2018 15:35:17 -0300
|
Source diff to previous version |
CVE-2018-0737 |
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to |
|
openssl (1.0.2g-1ubuntu4.11) xenial-security; urgency=medium
* SECURITY UPDATE: DoS via ASN.1 types with a recursive definition
- debian/patches/CVE-2018-0739.patch: limit stack depth in
crypto/asn1/asn1.h, crypto/asn1/asn1_err.c, crypto/asn1/tasn_dec.c.
- CVE-2018-0739
-- Marc Deslauriers <email address hidden> Tue, 27 Mar 2018 14:18:33 -0400
|
CVE-2018-0739 |
Constructed ASN.1 types with a recursive definition (such as can be ... |
|
About
-
Send Feedback to @ubuntu_updates