USN-5502-1: OpenSSL vulnerability

Publication date

5 July 2022

Overview

OpenSSL could be made to expose sensitive information over the network.


Packages

  • openssl - Secure Socket Layer (SSL) cryptographic library and tools

Details

Alex Chernyakhovsky discovered that OpenSSL incorrectly handled AES OCB
mode when using the AES-NI assembly optimized implementation on 32-bit
x86 platforms. A remote attacker could possibly use this issue to obtain
sensitive information.

Alex Chernyakhovsky discovered that OpenSSL incorrectly handled AES OCB
mode when using the AES-NI assembly optimized implementation on 32-bit
x86 platforms. A remote attacker could possibly use this issue to obtain
sensitive information.

Update instructions

After a standard system update you need to reboot your computer to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
22.04 jammy libssl3 –  3.0.2-0ubuntu1.6
21.10 impish libssl1.1 –  1.1.1l-1ubuntu1.6
20.04 focal libssl1.1 –  1.1.1f-1ubuntu2.16
18.04 bionic libssl1.1 –  1.1.1-1ubuntu2.1~18.04.20

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›