{"id":"USN-4376-2","summary":"openssl vulnerabilities","details":"USN-4376-1 fixed several vulnerabilities in OpenSSL. This update provides\nthe corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.\n\nOriginal advisory details:\n\n Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin,\n Alejandro Cabrera Aldaya, and Billy Brumley discovered that OpenSSL\n incorrectly handled ECDSA signatures. An attacker could possibly use this\n issue to perform a timing side-channel attack and recover private ECDSA\n keys. (CVE-2019-1547)\n\n Juraj Somorovsky, Robert Merget, and Nimrod Aviram discovered that certain\n applications incorrectly used OpenSSL and could be exposed to a padding\n oracle attack. A remote attacker could possibly use this issue to decrypt\n data. (CVE-2019-1559)\n\n Bernd Edlinger discovered that OpenSSL incorrectly handled certain\n decryption functions. In certain scenarios, a remote attacker could\n possibly use this issue to perform a padding oracle attack and decrypt\n traffic. (CVE-2019-1563)\n","modified":"2026-02-10T04:41:50Z","published":"2020-07-09T17:41:10Z","related":["UBUNTU-CVE-2019-1547","UBUNTU-CVE-2019-1559","UBUNTU-CVE-2019-1563"],"upstream":["CVE-2019-1547","CVE-2019-1559","CVE-2019-1563","UBUNTU-CVE-2019-1547","UBUNTU-CVE-2019-1559","UBUNTU-CVE-2019-1563"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4376-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-1547"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-1559"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-1563"}],"affected":[{"package":{"name":"openssl","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/openssl@1.0.1f-1ubuntu2.27+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.1f-1ubuntu2.27+esm1"}]}],"versions":["1.0.1e-3ubuntu1","1.0.1e-4ubuntu1","1.0.1e-4ubuntu2","1.0.1e-4ubuntu3","1.0.1e-4ubuntu4","1.0.1f-1ubuntu1","1.0.1f-1ubuntu2","1.0.1f-1ubuntu2.1","1.0.1f-1ubuntu2.2","1.0.1f-1ubuntu2.3","1.0.1f-1ubuntu2.4","1.0.1f-1ubuntu2.5","1.0.1f-1ubuntu2.7","1.0.1f-1ubuntu2.8","1.0.1f-1ubuntu2.11","1.0.1f-1ubuntu2.12","1.0.1f-1ubuntu2.15","1.0.1f-1ubuntu2.16","1.0.1f-1ubuntu2.17","1.0.1f-1ubuntu2.18","1.0.1f-1ubuntu2.19","1.0.1f-1ubuntu2.20","1.0.1f-1ubuntu2.21","1.0.1f-1ubuntu2.22","1.0.1f-1ubuntu2.23","1.0.1f-1ubuntu2.24","1.0.1f-1ubuntu2.25","1.0.1f-1ubuntu2.26","1.0.1f-1ubuntu2.27"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"libssl-dev","binary_version":"1.0.1f-1ubuntu2.27+esm1"},{"binary_name":"libssl1.0.0","binary_version":"1.0.1f-1ubuntu2.27+esm1"},{"binary_name":"openssl","binary_version":"1.0.1f-1ubuntu2.27+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4376-2.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-1547"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2019-1559"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-1563"}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}}],"schema_version":"1.7.3"}