~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to active/CVE-2017-17688

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2017-17688
2
 
PublicDate: 2018-05-16
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17688
5
 
 https://efail.de
6
 
Description:
7
 
 ** DISPUTED ** The OpenPGP specification allows a Cipher Feedback Mode
8
 
 (CFB) malleability-gadget attack that can indirectly lead to plaintext
9
 
 exfiltration, aka EFAIL. NOTE: third parties report that this is a problem
10
 
 in applications that mishandle the Modification Detection Code (MDC)
11
 
 feature or accept an obsolete packet type, not a problem in the OpenPGP
12
 
 specification.
13
 
Ubuntu-Description:
14
 
Notes:
15
 
Bugs:
16
 
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898630
17
 
Priority: medium
18
 
Discovered-by:
19
 
Assigned-to:
20
 
 
21
 
 
22
 
Patches_enigmail:
23
 
upstream_enigmail: needs-triage
24
 
precise/esm_enigmail: DNE
25
 
trusty_enigmail: needs-triage
26
 
xenial_enigmail: needs-triage
27
 
artful_enigmail: needs-triage
28
 
bionic_enigmail: needs-triage
29
 
devel_enigmail: needs-triage