Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in OpenSSL
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in OpenSSL
ID: USN-3475-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 17.04, Ubuntu 17.10
Datum: Mo, 6. November 2017, 22:43
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736
Applikationen: OpenSSL

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============3396285605370441499==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="h6ttm2HK9h9uqSnGpQMArRcrP2Nbk0MUA"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--h6ttm2HK9h9uqSnGpQMArRcrP2Nbk0MUA
Content-Type: multipart/mixed;
boundary="Vi5Btw0aG80viIXEt1nNOIaF2L0N445Nm";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <91fc52e4-94fe-b83c-ab78-7bc6774300b0@canonical.com>
Subject: [USN-3475-1] OpenSSL vulnerabilities

--Vi5Btw0aG80viIXEt1nNOIaF2L0N445Nm
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3475-1
November 06, 2017

openssl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in OpenSSL.

Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools

Details:

It was discovered that OpenSSL incorrectly parsed the IPAddressFamily
extension in X.509 certificates, resulting in an erroneous display of the
certificate in text format. (CVE-2017-3735)

It was discovered that OpenSSL incorrectly performed the x86_64 Montgomery
squaring procedure. While unlikely, a remote attacker could possibly use
this issue to recover private keys. This issue only applied to Ubuntu 16.04
LTS, Ubuntu 16.10 and Ubuntu 17.04. (CVE-2017-3736)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
libssl1.0.0 1.0.2g-1ubuntu13.2

Ubuntu 17.04:
libssl1.0.0 1.0.2g-1ubuntu11.3

Ubuntu 16.04 LTS:
libssl1.0.0 1.0.2g-1ubuntu4.9

Ubuntu 14.04 LTS:
libssl1.0.0 1.0.1f-1ubuntu2.23

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3475-1
CVE-2017-3735, CVE-2017-3736

Package Information:
https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu13.2
https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu11.3
https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu4.9
https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.23



--Vi5Btw0aG80viIXEt1nNOIaF2L0N445Nm--

--h6ttm2HK9h9uqSnGpQMArRcrP2Nbk0MUA
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=LorH
-----END PGP SIGNATURE-----

--h6ttm2HK9h9uqSnGpQMArRcrP2Nbk0MUA--


--===============3396285605370441499==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============3396285605370441499==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung