According to Ubuntu's CVE-2022-0778 this release should address the CVE. However, when I look at the OpenSSL version I can't really tell that it is 1.1.1n. I do see that it was built on Mar 9 prior to:
- OpenSSL making the source available to the public
- Ubuntu distro managers importing OpenSSL 1.1.1n into their repo (which may just be a public facing repo)
So, how would I know that this is truly 1.1.1n?
Ubuntu 18.04 system after upgrade
OpenSSL 1.1.1 11 Sep 2018
built on: Wed Mar 9 12:13:40 2022 UTC
platform: debian-amd64
options: bn(64,64) rc4(16x,int) des(int) blowfish(ptr)
compiler: gcc -fPIC -pthread -m64 -Wa,--noexecstack -Wall -Wa,
--noexecstack -g -O2 -fdebug-prefix-map=/build/openssl-vxXVMf/openssl-1.1.1=.
-fstack-protector-strong -Wformat -Werror=format-security -DOPENSSL_USE_NODELETE
-DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2
-DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM
-DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM
-DMD5_ASM -DAES_ASM -DVPAES_ASM -DBSAES_ASM -DGHASH_ASM
-DECP_NISTZ256_ASM -DX25519_ASM -DPADLOCK_ASM -DPOLY1305_ASM
-DNDEBUG -Wdate-time -D_FORTIFY_SOURCE=2
OPENSSLDIR: "/usr/lib/ssl"
ENGINESDIR: "/usr/lib/x86_64-linux-gnu/engines-1.1"
Seeding source: os-specific
Distro Maintainer
Ubuntu Repo: https://git.launchpad.net/ubuntu/+source/openssl
Tags:
* 3b83ed56dea2b735e31731fd042b52ff869f9a97 -
(tag: import/1.1.1n-1, origin/debian/sid) 1.1.1n-1
(patches unapplied) (c: Wed, 16 Mar 2022 04:33:58 +0000)
(a: Tue, 15 Mar 2022 19:46:18 +0100) <Sebastian Andrzej Siewior>%
applied/1.1.1n-1
* d4d5eeef3576b16013c48abc435c5da889cedf1b - (tag: applied/1.1.1n-1,
origin/applied/debian/sid) 1.1.1n-1 (patches applied)
(c: Wed, 16 Mar 2022 04:33:58 +0000)
(a: Tue, 15 Mar 2022 19:46:18 +0100) <Sebastian Andrzej Si