Package "openssl1.0"

Name: openssl1.0


Secure Sockets Layer toolkit 1.0 - cryptographic utility

Latest version: 1.0.2n-1ubuntu5.4
Release: bionic (18.04)
Level: updates
Repository: universe
Homepage: https://www.openssl.org


Download "openssl1.0"

Other versions of "openssl1.0" in Bionic

Repository Area Version
base universe 1.0.2n-1ubuntu5
security main 1.0.2n-1ubuntu5.4
security universe 1.0.2n-1ubuntu5.4
updates main 1.0.2n-1ubuntu5.4


Version: 1.0.2n-1ubuntu5.4 2020-09-16 15:06:19 UTC

  openssl1.0 (1.0.2n-1ubuntu5.4) bionic-security; urgency=medium

  * SECURITY UPDATE: Raccoon Attack
    - debian/patches/CVE-2020-1968.patch: disable ciphers that reuse the
      DH secret across multiple TLS connections in ssl/s3_lib.c.
    - CVE-2020-1968
  * SECURITY UPDATE: ECDSA remote timing attack
    - debian/patches/CVE-2019-1547.patch: for ECC parameters with NULL or
      zero cofactor, compute it in crypto/ec/ec.h, crypto/ec/ec_err.c,
    - CVE-2019-1547
  * SECURITY UPDATE: rsaz_512_sqr overflow bug on x86_64
    - debian/patches/CVE-2019-1551.patch: fix an overflow bug in
      rsaz_512_sqr in crypto/bn/asm/rsaz-x86_64.pl.
    - CVE-2019-1551
  * SECURITY UPDATE: Padding Oracle issue
    - debian/patches/CVE-2019-1563.patch: fix a padding oracle in
      PKCS7_dataDecode and CMS_decrypt_set1_pkey in crypto/cms/cms_env.c,
      crypto/cms/cms_lcl.h, crypto/cms/cms_smime.c,
    - CVE-2019-1563

 -- Marc Deslauriers <email address hidden> Wed, 16 Sep 2020 07:51:13 -0400

Source diff to previous version
CVE-2020-1968 The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections
CVE-2019-1547 Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is po
CVE-2019-1551 There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analy
CVE-2019-1563 In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very l

Version: 1.0.2n-1ubuntu5.3 2019-02-27 19:06:38 UTC

  openssl1.0 (1.0.2n-1ubuntu5.3) bionic-security; urgency=medium

  * SECURITY UPDATE: 0-byte record padding oracle
    - debian/patches/CVE-2019-1559.patch: go into the error state if a
      fatal alert is sent or received in ssl/d1_pkt.c, ssl/s3_pkt.c.
    - CVE-2019-1559
  * debian/patches/s390x-fix-aes-gcm-tls.patch: fix typo in backported
    s390x hw acceleration patch. (LP: #1775018)

 -- Marc Deslauriers <email address hidden> Tue, 26 Feb 2019 14:46:16 -0500

Source diff to previous version
CVE-2019-1559 0-byte record padding oracle

Version: 1.0.2n-1ubuntu5.2 2018-12-06 20:07:11 UTC

  openssl1.0 (1.0.2n-1ubuntu5.2) bionic-security; urgency=medium

  * SECURITY UPDATE: PortSmash side channel attack
    - debian/patches/CVE-2018-5407.patch: fix timing vulnerability in
      crypto/bn/bn_lib.c, crypto/ec/ec_mult.c.
    - CVE-2018-5407
  * SECURITY UPDATE: timing side channel attack in DSA
    - debian/patches/CVE-2018-0734-1.patch: fix timing vulnerability in
    - debian/patches/CVE-2018-0734-2.patch: fix mod inverse in
    - debian/patches/CVE-2018-0734-3.patch: add a constant time flag in
    - CVE-2018-0734

 -- Marc Deslauriers <email address hidden> Tue, 04 Dec 2018 10:58:01 -0500

Source diff to previous version
CVE-2018-5407 Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing at
CVE-2018-0734 The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing

Version: 1.0.2n-1ubuntu5.1 2018-06-26 13:07:17 UTC

  openssl1.0 (1.0.2n-1ubuntu5.1) bionic-security; urgency=medium

  * SECURITY UPDATE: ECDSA key extraction side channel
    - debian/patches/CVE-2018-0495.patch: add blinding to an ECDSA
      signature in crypto/ecdsa/ecdsatest.c, crypto/ecdsa/ecs_ossl.c.
    - CVE-2018-0495
  * SECURITY UPDATE: denial of service via long prime values
    - debian/patches/CVE-2018-0732.patch: reject excessively large primes
      in DH key generation in crypto/dh/dh_key.c.
    - CVE-2018-0732
  * SECURITY UPDATE: RSA cache timing side channel attack
    - debian/patches/CVE-2018-0737-1.patch: replaced variable-time GCD in
    - debian/patches/CVE-2018-0737-2.patch: used ERR set/pop mark in
    - debian/patches/CVE-2018-0737-3.patch: consttime flag changed in
    - debian/patches/CVE-2018-0737-4.patch: ensure BN_mod_inverse and
      BN_mod_exp_mont both get called with BN_FLG_CONSTTIME flag set in
    - CVE-2018-0737

 -- Marc Deslauriers <email address hidden> Wed, 20 Jun 2018 08:00:56 -0400

CVE-2018-0495 Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of
CVE-2018-0732 During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will
CVE-2018-0737 The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to

About   -   Send Feedback to @ubuntu_updates