~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
PublicDateAtUSN: 2013-02-08
Candidate: CVE-2013-0169
PublicDate: 2013-02-08
References: 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
 http://www.openssl.org/news/secadv_20130204.txt
 http://www.isg.rhul.ac.uk/tls/
 http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html
 http://www.ubuntu.com/usn/usn-1732-1
 http://www.ubuntu.com/usn/usn-1735-1
 http://www.ubuntu.com/usn/usn-1732-3
Description:
 The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in
 OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider
 timing side-channel attacks on a MAC check requirement during the
 processing of malformed CBC padding, which allows remote attackers to
 conduct distinguishing attacks and plaintext-recovery attacks via
 statistical analysis of timing data for crafted packets, aka the "Lucky
 Thirteen" issue.
Ubuntu-Description: 
Notes: 
 jdstrand> 1.0.1d has incorrect fix. Use 1.0.1e:
 mdeslaur> regression bug: http://rt.openssl.org/Ticket/Display.html?id=2975&user=guest&pass=guest
 mdeslaur> 1.0.1e still contains another regression:
 mdeslaur> another regression: http://rt.openssl.org/Ticket/Display.html?id=2984&user=guest&pass=guest
 mdeslaur> OpenSSL fix reverted by 1732-2 because of regression
 mdeslaur> (see: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1133333)
 mdeslaur> (see: http://rt.openssl.org/Ticket/Display.html?id=3002)
 mdeslaur> (see: bugs.debian.org/cgi-bin/bugreport.cgi?bug=701868)
Bugs: 
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0169
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699889
Priority: medium
Discovered-by: Nadhem Alfardan, Kenny Paterson
Assigned-to: mdeslaur

Patches_openssl:
upstream_openssl: released (0.9.8y, 1.0.0k, 1.0.1e)
hardy_openssl: released (0.9.8g-4ubuntu3.20)
lucid_openssl: released (0.9.8k-7ubuntu8.14)
oneiric_openssl: released (1.0.0e-2ubuntu4.7)
precise_openssl: released (1.0.1-4ubuntu5.8)
quantal_openssl: released (1.0.1c-3ubuntu2.3)
raring_openssl: released (1.0.1c-4ubuntu8)
saucy_openssl: released (1.0.1c-4ubuntu8)
trusty_openssl: released (1.0.1c-4ubuntu8)
devel_openssl: released (1.0.1c-4ubuntu8)

Patches_openssl098:
upstream_openssl098: released (0.9.8y)
hardy_openssl098: DNE
lucid_openssl098: DNE
oneiric_openssl098: ignored (reached end-of-life)
precise_openssl098: released (0.9.8o-7ubuntu3.2)
quantal_openssl098: ignored (reached end-of-life)
raring_openssl098: ignored (reached end-of-life)
saucy_openssl098: released (0.9.8o-7ubuntu3.2.13.10.1)
trusty_openssl098: released (0.9.8o-7ubuntu3.2.14.04.1)
devel_openssl098: released (0.9.8o-7ubuntu4)

Patches_openjdk-6:
upstream_openjdk-6: released (6b27-1.12.3)
hardy_openjdk-6: released (6b27-1.12.3-0ubuntu1~08.04.1)
lucid_openjdk-6: released (6b27-1.12.3-0ubuntu1~10.04)
oneiric_openjdk-6: released (6b27-1.12.3-0ubuntu1~11.10)
precise_openjdk-6: released (6b27-1.12.3-0ubuntu1~12.04)
quantal_openjdk-6: released (6b27-1.12.3-0ubuntu1~12.10)
raring_openjdk-6: released (6b27-1.12.3-1ubuntu1)
saucy_openjdk-6: released (6b27-1.12.3-1ubuntu1)
trusty_openjdk-6: released (6b27-1.12.3-1ubuntu1)
devel_openjdk-6: released (6b27-1.12.3-1ubuntu1)

Patches_openjdk-7:
upstream_openjdk-7: pending (7u13-2.3.7)
hardy_openjdk-7: DNE
lucid_openjdk-7: DNE
oneiric_openjdk-7: released (7u15-2.3.7-0ubuntu1~11.10)
precise_openjdk-7: released (7u15-2.3.7-0ubuntu1~12.04)
quantal_openjdk-7: released (7u15-2.3.7-0ubuntu1~12.10)
raring_openjdk-7: released (7u15-2.3.7-1ubuntu1)
saucy_openjdk-7: released (7u15-2.3.7-1ubuntu1)
trusty_openjdk-7: released (7u15-2.3.7-1ubuntu1)
devel_openjdk-7: released (7u15-2.3.7-1ubuntu1)