UbuntuUpdates.org

Package "openssl1.0"

Name: openssl1.0

Description:

Secure Sockets Layer toolkit 1.0 - cryptographic utility

Latest version: 1.0.2n-1ubuntu6.2
Release: cosmic (18.10)
Level: updates
Repository: universe
Homepage: https://www.openssl.org

Links

Save this URL for the latest version of "openssl1.0": https://www.ubuntuupdates.org/openssl1.0


Download "openssl1.0"


Other versions of "openssl1.0" in Cosmic

Repository Area Version
base main 1.0.2n-1ubuntu6
base universe 1.0.2n-1ubuntu6
security universe 1.0.2n-1ubuntu6.2
security main 1.0.2n-1ubuntu6.2
updates main 1.0.2n-1ubuntu6.2

Changelog

Version: 1.0.2n-1ubuntu6.2 2019-02-27 19:06:39 UTC

  openssl1.0 (1.0.2n-1ubuntu6.2) cosmic-security; urgency=medium

  * SECURITY UPDATE: 0-byte record padding oracle
    - debian/patches/CVE-2019-1559.patch: go into the error state if a
      fatal alert is sent or received in ssl/d1_pkt.c, ssl/s3_pkt.c.
    - CVE-2019-1559
  * debian/patches/s390x-fix-aes-gcm-tls.patch: fix typo in backported
    s390x hw acceleration patch. (LP: #1775018)

 -- Marc Deslauriers <email address hidden> Tue, 26 Feb 2019 14:45:07 -0500

Source diff to previous version
CVE-2019-1559 0-byte record padding oracle

Version: 1.0.2n-1ubuntu6.1 2018-12-06 20:07:12 UTC

  openssl1.0 (1.0.2n-1ubuntu6.1) cosmic-security; urgency=medium

  * SECURITY UPDATE: PortSmash side channel attack
    - debian/patches/CVE-2018-5407.patch: fix timing vulnerability in
      crypto/bn/bn_lib.c, crypto/ec/ec_mult.c.
    - CVE-2018-5407
  * SECURITY UPDATE: timing side channel attack in DSA
    - debian/patches/CVE-2018-0734-1.patch: fix timing vulnerability in
      crypto/dsa/dsa_ossl.c.
    - debian/patches/CVE-2018-0734-2.patch: fix mod inverse in
      crypto/dsa/dsa_ossl.c.
    - debian/patches/CVE-2018-0734-3.patch: add a constant time flag in
      crypto/dsa/dsa_ossl.c.
    - CVE-2018-0734

 -- Marc Deslauriers <email address hidden> Tue, 04 Dec 2018 10:55:32 -0500

CVE-2018-5407 Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing at
CVE-2018-0734 The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing



About   -   Send Feedback to @ubuntu_updates