Ubuntu users, It’s Time For an Upgrade to Patch Serious OpenSSL Vulnerability.

Ubuntu OpenSSL vulnerability

Ubuntu OpenSSL vulnerability

Ubuntu is one of the most popular and most loved Linux distribution in the world of Linux. It is beginners friendly and easy to use and best distro to begin with.

Canonical, the organization behind Ubuntu constantly develops and maintain Ubuntu and it’s flavors.

Now Canonical has released a security update to patch the serious OpenSSL vulnerability that has been discovered a while ago.

OpenSSL is an open-source cryptographic library that is the most widely being used by a significant portion of the Internet services; to cryptographically protect their sensitive Web and e-mail traffic using the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocol.

The vulnerabilities that were found in OpenSSL, could let a remote attackers to launch a denial of service attacks.

In order to prevent the Ubuntu machines from this critical vulnerability Canonical released a security updates for several of its Ubuntu versions.

Here is the list of Ubuntu flavors that has been affected:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

So if you are using any of the above distributions then it is suggested to upgrade immediately.

The problem can be fixed by updating your system to the following package version:

Ubuntu 16.10:
libssl1.0.0    1.0.2g-1ubuntu9.1
Ubuntu 16.04 LTS:
libssl1.0.0     1.0.2g-1ubuntu4.6
Ubuntu 14.04 LTS:
libssl1.0.0     1.0.1f-1ubuntu2.22
Ubuntu 12.04 LTS:
libssl1.0.0     1.0.1-4ubuntu5.39

Depending on the version you use download the respective patch and install it.

If you need any help in upgrading Ubuntu here is a quick handy guide that will assist you.

Recommended:  How To Easily Transcribe An Audio Notes In Linux?

Also Read: Linus Torvalds First Line of Code.

Stay safe and enjoy the freedom of Linux.

If you have any queries regarding the update reach us through comments below. Meanwhile share this information with your friends in your network and help them stay safe.

Share it

Was this post helpful?

Ganesh Venigalla

Geek, Passionate, Nerd for Tech!

You may also like...

5 Responses

  1. Juan Pablo Firrincieli says:

    Dude where it’s the CVE or USN number? I think that you got this wrong…

    • CuriousPost says:

      Hi buddy for an in depth info please refer Ubuntu source mentioned at end of article

    • CuriousPost says:

      It was from the official Ubuntu blog and you can please refer the source provided below. Thank you buddy

      • Juan Pablo Firrincieli says:

        Please check the CVE’s 3 of them are low priority and one medium, there’s 0 high or critical priority so the “serious” part it’s minimum a mistake.
        Also no hack or use of any of this vulnerabilities exist right now on the wild and the article it’s 2 days late.
        This kind of articles are no good for the Linux, OpenSSL and Ubuntu environment, please consider the next time to look at the CVE’s and USN’s priority before using words like serious flaw. 😉

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Ubuntu users, It’s Time For an Upgrade to Patch Serious OpenSSL Vulnerability.

by Ganesh Venigalla time to read: 1 min