drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in OpenSSL
Name: |
Mehrere Probleme in OpenSSL |
|
ID: |
USN-4376-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 19.10 |
|
Datum: |
Do, 28. Mai 2020, 18:04 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547 |
|
Applikationen: |
OpenSSL |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============3497604111012615852== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="goiQD53kFDv4icpAY4O1k7uTyH9PhyM5Y"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --goiQD53kFDv4icpAY4O1k7uTyH9PhyM5Y Content-Type: multipart/mixed; boundary="pDMWWaCec7vPnwf2pDWG0iXBwbGOzp472"
--pDMWWaCec7vPnwf2pDWG0iXBwbGOzp472 Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4376-1 May 28, 2020
openssl vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in OpenSSL.
Software Description: - openssl: Secure Socket Layer (SSL) cryptographic library and tools
Details:
Cesar Pereida GarcÃa, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, and Billy Brumley discovered that OpenSSL incorrectly handled ECDSA signatures. An attacker could possibly use this issue to perform a timing side-channel attack and recover private ECDSA keys. (CVE-2019-1547)
Matt Caswell discovered that OpenSSL incorrectly handled the random number generator (RNG). This may result in applications that use the fork() system call sharing the same RNG state between the parent and the child, contrary to expectations. This issue only affected Ubuntu 18.04 LTS and Ubuntu 19.10. (CVE-2019-1549)
Guido Vranken discovered that OpenSSL incorrectly performed the x86_64 Montgomery squaring procedure. While unlikely, a remote attacker could possibly use this issue to recover private keys. (CVE-2019-1551)
Bernd Edlinger discovered that OpenSSL incorrectly handled certain decryption functions. In certain scenarios, a remote attacker could possibly use this issue to perform a padding oracle attack and decrypt traffic. (CVE-2019-1563)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.10: libssl1.1 1.1.1c-1ubuntu4.1
Ubuntu 18.04 LTS: libssl1.1 1.1.1-1ubuntu2.1~18.04.6
Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.16
After a standard system update you need to reboot your computer to make all the necessary changes.
References: https://usn.ubuntu.com/4376-1 CVE-2019-1547, CVE-2019-1549, CVE-2019-1551, CVE-2019-1563
Package Information: https://launchpad.net/ubuntu/+source/openssl/1.1.1c-1ubuntu4.1 https://launchpad.net/ubuntu/+source/openssl/1.1.1-1ubuntu2.1~18.04.6 https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu4.16
--pDMWWaCec7vPnwf2pDWG0iXBwbGOzp472--
--goiQD53kFDv4icpAY4O1k7uTyH9PhyM5Y Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAl7Puk4ACgkQZWnYVadE vpM4vxAAnhQhACrHoSatnx6VmyI7eZY5EZByy84Gtro0vl/D0EvvibR//YZL0LRs v8QQCATS9LLz8TvC+/Mg43vg0roOFHidYOJ1d7dwA29JZA2hmuEz13liXRBZgECe oKQu2DrspWPnUa96YZ/k4HO8ooLgBeczT7V2gJswsNa03D3dqB5jrPy7NXbdp/SK 0FMCl2hmkDnR3cJVZli1SOAlvEl3xkJvEF9s71M/LIjCKWyK0dESLWTAnip2KzvW BKVHFznI9+lz3dLCz1OFuM2/bZFQuDa8Z9zdIidE0tpW1i9T9HUt7L0vFcaPAW1c YcvqSJpulyASPpunBUc4KLQpmXvtaII5ADFVsbdzpJl7nhHkshNtmJn0GTSQEvbk xzRMQsigTSNFYMKqhdDstSMrdcidrCziH3QPE5eSueBILlS1dB41VfNdeRmzwf/P SrNVlAo3KzTlfBy3yJLGmUqiGW5/1Ic4x8duJn87xwGFlu5lem4+h9biFeX0FwvV BU//ymOB7ovFwN+m9mMrVB5robMW9//dP5fKvCpVszPLG2FYr0h1ZxvRqAajzDNW Gk1qS0rW+NcbkE65/1eCyQehR58v9zWOiJpk9qjjMen/xPZuMA8NN6NcrWHxm4+u ATEeKhK1MxeTuWmGZ1IojBnoaxRQ3QEe1BTzjaZva00uYSLbemE= =muwm -----END PGP SIGNATURE-----
--goiQD53kFDv4icpAY4O1k7uTyH9PhyM5Y--
--===============3497604111012615852== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============3497604111012615852==--
|
|
|
|