Ubuntu reports that updating to libssl1.0.0
and 1.0.1-4ubuntu5.14
will address CVE-2014-0224 (USN-2232-1)
That these are the installed libraries can be verified with apt-cache policy openssl
:
apt-cache policy openssl
openssl:
Installed: 1.0.1-4ubuntu5.14
Candidate: 1.0.1-4ubuntu5.14
Version table:
*** 1.0.1-4ubuntu5.14 0
500 http://us-east-1.ec2.archive.ubuntu.com/ubuntu/ precise-updates/main amd64 Packages
500 http://security.ubuntu.com/ubuntu/ precise-security/main amd64 Packages
100 /var/lib/dpkg/status
1.0.1-4ubuntu3 0
500 http://us-east-1.ec2.archive.ubuntu.com/ubuntu/ precise/main amd64 Packages
The vulnerability was reported on June 5, 2014 (see here)
After updating with apt-get update
and apt-get upgrade
, however, openssl version -a
reports that the build date was before the date the vulnerability was reported.
openssl version -a
OpenSSL 1.0.1 14 Mar 2012
built on: Mon Jun 2 19:37:18 UTC 2014
platform: debian-amd64
options: bn(64,64) rc4(16x,int) des(idx,cisc,16,int) blowfish(idx)
compiler: cc -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -m64 -DL_ENDIAN -DTERMIO -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Wformat-security -Werror=format-security -D_FORTIFY_SOURCE=2 -Wl,-Bsymbolic-functions -Wl,-z,relro -Wa,--noexecstack -Wall -DOPENSSL_NO_TLS1_2_CLIENT -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 -DMD32_REG_T=int -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM
OPENSSLDIR: "/usr/lib/ssl"
My question:
Is the build date preceding the report date significant? Do I have to go outside the normal update/upgrade approach using apt and compile from source?
(Please note: this is not a duplicate of another question about CVE-2014-0224 (see here))
1.0.1-4ubuntu5.14
? – saiarcot895 Jun 12 '14 at 18:23