UbuntuUpdates.org

Package "openssl"

Name: openssl

Description:

Secure Sockets Layer toolkit - cryptographic utility

Latest version: 1.1.1-1ubuntu2.1~18.04.4
Release: bionic (18.04)
Level: updates
Repository: main
Homepage: https://www.openssl.org/

Links

Save this URL for the latest version of "openssl": https://www.ubuntuupdates.org/openssl


Download "openssl"


Other versions of "openssl" in Bionic

Repository Area Version
base main 1.1.0g-2ubuntu4
security main 1.1.0g-2ubuntu4.3
proposed main 1.1.1-1ubuntu2.1~18.04.4

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.1.1-1ubuntu2.1~18.04.4 2019-07-15 17:07:04 UTC

  openssl (1.1.1-1ubuntu2.1~18.04.4) bionic; urgency=medium

  * Import libraries/restart-without-asking as used in postinst, to
    prevent failure to configure the package without debconf database.
    LP: #1832919

 -- Dimitri John Ledkov <email address hidden> Thu, 20 Jun 2019 18:36:28 +0100

Source diff to previous version
1832919 installed libssl1.1:amd64 package post-installation script subprocess returned error exit status 10

Version: 1.1.1-1ubuntu2.1~18.04.3 2019-06-20 20:07:17 UTC

  openssl (1.1.1-1ubuntu2.1~18.04.3) bionic; urgency=medium

  * Fix path to Xorg for reboot notifications on desktop. LP: #1832421
  * Cherrypick upstream fix to allow succesful init of libssl and
    libcrypto using separate calls with different options. LP: #1832659

 -- Dimitri John Ledkov <email address hidden> Fri, 14 Jun 2019 13:50:28 +0100

Source diff to previous version
1832421 openssl reboot needed message using incorrect path to X server
1832659 openssl 1.1.1-1ubuntu2.1~18.04.1 contains upstream bug 7350

Version: 1.1.1-1ubuntu2.1~18.04.2 2019-06-14 03:06:55 UTC

  openssl (1.1.1-1ubuntu2.1~18.04.2) bionic; urgency=medium

  * Cherrypick upstream patch to fix ca -spkac output to be text again.
    LP: #1828215
  * Cherrypick upstream patch to prevent over long nonces in ChaCha20-Poly1305
    CVE-2019-1543
  * Bump major version of OpenSSL in postinst to trigger services restart
    upon upgrade. Many services listed there must be restarted when
    upgrading 1.1.0 to 1.1.1. LP: #1832522

 -- Dimitri John Ledkov <email address hidden> Wed, 12 Jun 2019 00:12:47 +0100

Source diff to previous version
1828215 openssl ca -spkac output regressed
1832522 openssl maintainer scripts do not trigger services restart
CVE-2019-1543 ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) s

Version: 1.1.1-1ubuntu2.1~18.04.1 2019-06-10 17:06:13 UTC

  openssl (1.1.1-1ubuntu2.1~18.04.1) bionic; urgency=medium

  * Backport OpenSSL 1.1.1 to 18.04 LTS. LP: #1797386
  * Adjust Breaks on versions published in bionic-release.

Source diff to previous version

Version: 1.1.0g-2ubuntu4.3 2018-12-06 20:07:09 UTC

  openssl (1.1.0g-2ubuntu4.3) bionic-security; urgency=medium

  * SECURITY UPDATE: PortSmash side channel attack
    - debian/patches/CVE-2018-5407-*.patch: add large number of upstream
      commits to resolve this issue.
    - CVE-2018-5407
  * SECURITY UPDATE: timing side channel attack in DSA
    - debian/patches/CVE-2018-0734-1.patch: fix mod inverse in
      crypto/dsa/dsa_ossl.c.
    - debian/patches/CVE-2018-0734-2.patch: fix timing vulnerability in
      crypto/dsa/dsa_ossl.c.
    - debian/patches/CVE-2018-0734-3.patch: add a constant time flag in
      crypto/dsa/dsa_ossl.c.
    - CVE-2018-0734
  * SECURITY UPDATE: timing side channel attack in ECDSA
    - debian/patches/CVE-2018-0735-1.patch: fix timing vulberability in
      crypto/ec/ec_mult.c.
    - debian/patches/CVE-2018-0735-2.patch: remove brace from bad
      cherry-pick in crypto/ec/ec_mult.c.
    - CVE-2018-0735

 -- Marc Deslauriers <email address hidden> Wed, 05 Dec 2018 10:59:52 -0500

CVE-2018-5407 Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing at
CVE-2018-0734 The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing
CVE-2018-0735 The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signin



About   -   Send Feedback to @ubuntu_updates