Patched OpenSSL for the Heartbleed Bug

Phil Wyett aura.yoda at gmail.com
Wed Apr 9 18:40:51 UTC 2014


On Wed, 2014-04-09 at 23:48 +0530, Shenal Silva wrote:
> Thanx Phil for your prompt reply . 
> So long story short security update for Trusty Tahr (14.04) Beta users
> won't be available anytime soon is it ??
> 
> Regards,
> Shenal Silva,
> Mobile:+94718670210
>           +94786903735
> Skype:shenal777
> 
> 
> On 9 April 2014 20:53, Phil Wyett <aura.yoda at gmail.com> wrote:
>         On Wed, 2014-04-09 at 20:32 +0530, Shenal Silva wrote:
>         > Hi All,
>         > As most of you'll know A serious vulnerability called the
>         "Hearbleed"
>         > bug has been discovered and the vulnerable version (OpenSSL
>         1.0.1f 6
>         > Jan 2014) is the version still in the repositories. Can
>         someone look
>         > into updating the repositories with the patched version
>         (1.0.0g) it
>         > would be really good
>         > Regards,
>         > Regards,
>         > Shenal Silva,
>         > Mobile:+94718670210
>         >           +94786903735
>         > Skype:shenal777
>         
>         
>         Updates for supported releases:
>         http://www.ubuntu.com/usn/usn-2165-1/
>         
>         Trusty aka what will be 14.04:
>         
>         openssl (1.0.1f-1ubuntu2) trusty; urgency=medium
>         
>           * SECURITY UPDATE: side-channel attack on Montgomery ladder
>         implementation
>             - debian/patches/CVE-2014-0076.patch: add and use constant
>         time swap
>         in
>               crypto/bn/bn.h, crypto/bn/bn_lib.c,
>         crypto/ec/ec2_mult.c,
>               util/libeay.num.
>             - CVE-2014-0076
>           * SECURITY UPDATE: memory disclosure in TLS heartbeat
>         extension
>             - debian/patches/CVE-2014-0160.patch: use correct lengths
>         in
>               ssl/d1_both.c, ssl/t1_lib.c.
>             - CVE-2014-0160
>         
>         Date: Mon, 07 Apr 2014 15:37:53 -0400
>         Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
>         
>         Regards
>         
>         Phil
>         
>         --
>         
>         Phil Wyett
>         {
>             GNU Linux User and Developer
>             Leigh GNU Linux User Group (http://leigh.lug.org.uk)
>             IRC: philwyett
>             Twitter: philwyett and leigh_lug
>         }
>         
>         --
>         Ubuntu-GNOME mailing list
>         Ubuntu-GNOME at lists.ubuntu.com
>         Modify settings or unsubscribe at:
>         https://lists.ubuntu.com/mailman/listinfo/ubuntu-gnome
>         
> 
> 

The updated and fixed '1.0.1f-1ubuntu2' package is on the servers now
and an upgrade will pull it in and install it.

To check which version is install do (in terminal):

dpkg -s openssl

Regards

Phil

-- 

Phil Wyett
{
    GNU Linux User and Developer
    Leigh GNU Linux User Group (http://leigh.lug.org.uk)
    IRC: philwyett
    Twitter: philwyett and leigh_lug
}
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: This is a digitally signed message part
URL: <https://lists.ubuntu.com/archives/ubuntu-gnome/attachments/20140409/6253dcac/attachment-0001.pgp>


More information about the Ubuntu-GNOME mailing list