OpenSSL released a security advisory, warning users of two recently discovered vulnerabilities:
- Memory corruption in the ASN.1 encoder (CVE-2016-2108)
- Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)
Their recommendation is as follows:
OpenSSL 1.0.2 users should upgrade to 1.0.2h
OpenSSL 1.0.1 users should upgrade to 1.0.1t
However, the latest version available for Trusty (14.04) is 1.0.1f-1ubuntu2.19
. How come such an old version is still being provided and how do I mitigate this?