Rick St. George
March 11th, 2019, 08:52 PM
Does anyone know if recent Updates for v16.04 include features that render same problems experienced with failed install of v18.04, such as not being able to access the internet (failed DNS).
I see updates such as "SSL toolkit", DNS Shared Library, BIND;
SECURITY UPDATE: 0-byte record padding oracle
- debian/patches/CVE-2019-1559.patch: go into the error state if a fatal alert is sent or received in ssl/d1_pkt.c, ssl/s3_pkt.c.
- CVE-2019-1559
AND
SECURITY UPDATE: assertion failure when a trust anchor rolls over to an unsupported key algorithm when using managed-keys
The above sounds like Opera going into Error Mode, and DNS denial, which is what we were experiencing with v18.04. See this Post - https://ubuntuforums.org/showthread.php?t=2411324
Luckily, we had a BackUp.
See List of "Software Updater" here: http://lhcyoga.com/images/Updater-scrshot-7Mar2019.jpg
So, we fear installing these updates for v16.04, as we are hesistant for the above reasons. Any guess as to whether these are safe or not?
Thanks!
I see updates such as "SSL toolkit", DNS Shared Library, BIND;
SECURITY UPDATE: 0-byte record padding oracle
- debian/patches/CVE-2019-1559.patch: go into the error state if a fatal alert is sent or received in ssl/d1_pkt.c, ssl/s3_pkt.c.
- CVE-2019-1559
AND
SECURITY UPDATE: assertion failure when a trust anchor rolls over to an unsupported key algorithm when using managed-keys
The above sounds like Opera going into Error Mode, and DNS denial, which is what we were experiencing with v18.04. See this Post - https://ubuntuforums.org/showthread.php?t=2411324
Luckily, we had a BackUp.
See List of "Software Updater" here: http://lhcyoga.com/images/Updater-scrshot-7Mar2019.jpg
So, we fear installing these updates for v16.04, as we are hesistant for the above reasons. Any guess as to whether these are safe or not?
Thanks!