USN-1451-1: OpenSSL vulnerabilities

Publication date

24 May 2012

Overview

Applications using OpenSSL in certain situations could be made to crash or expose sensitive information.


Packages

  • openssl - Secure Socket Layer (SSL) cryptographic library and tools

Details

Ivan Nestlerode discovered that the Cryptographic Message Syntax
(CMS) and PKCS #7 implementations in OpenSSL returned early if RSA
decryption failed. This could allow an attacker to expose sensitive
information via a Million Message Attack (MMA). (CVE-2012-0884)

It was discovered that an integer underflow was possible when using
TLS 1.1, TLS 1.2, or DTLS with CBC encryption. This could allow a
remote attacker to cause a denial of service. (CVE-2012-2333)

Ivan Nestlerode discovered that the Cryptographic Message Syntax
(CMS) and PKCS #7 implementations in OpenSSL returned early if RSA
decryption failed. This could allow an attacker to expose sensitive
information via a Million Message Attack (MMA). (CVE-2012-0884)

It was discovered that an integer underflow was possible when using
TLS 1.1, TLS 1.2, or DTLS with CBC encryption. This could allow a
remote attacker to cause a denial of service. (CVE-2012-2333)

Update instructions

After a standard system update you need to reboot your computer to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
8.04 hardy libssl0.9.8 –  0.9.8g-4ubuntu3.19
openssl –  0.9.8g-4ubuntu3.19
12.04 precise libssl1.0.0 –  1.0.1-4ubuntu5.2
openssl –  1.0.1-4ubuntu5.2
11.10 oneiric libssl1.0.0 –  1.0.0e-2ubuntu4.6
openssl –  1.0.0e-2ubuntu4.6
11.04 natty libssl0.9.8 –  0.9.8o-5ubuntu1.7
openssl –  0.9.8o-5ubuntu1.7
10.04 lucid libssl0.9.8 –  0.9.8k-7ubuntu8.13
openssl –  0.9.8k-7ubuntu8.13

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›