CVE-2013-0169
Publication date 8 February 2013
Last updated 24 July 2024
Ubuntu priority
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
Status
Package | Ubuntu Release | Status |
---|---|---|
openjdk-6 | 14.04 LTS trusty |
Fixed 6b27-1.12.3-1ubuntu1
|
openjdk-7 | 14.04 LTS trusty |
Fixed 7u15-2.3.7-1ubuntu1
|
openssl | 14.04 LTS trusty |
Fixed 1.0.1c-4ubuntu8
|
openssl098 | 14.04 LTS trusty |
Fixed 0.9.8o-7ubuntu3.2.14.04.1
|
Notes
jdstrand
1.0.1d has incorrect fix. Use 1.0.1e:
mdeslaur
regression bug: http://rt.openssl.org/Ticket/Display.html?id=2975&user=guest&pass=guest 1.0.1e still contains another regression: another regression: http://rt.openssl.org/Ticket/Display.html?id=2984&user=guest&pass=guest OpenSSL fix reverted by 1732-2 because of regression (see: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1133333) (see: http://rt.openssl.org/Ticket/Display.html?id=3002) (see: bugs.debian.org/cgi-bin/bugreport.cgi?bug=701868)
References
Related Ubuntu Security Notices (USN)
- USN-1732-3
- OpenSSL vulnerability
- 25 March 2013
- USN-1732-1
- OpenSSL vulnerabilities
- 21 February 2013
- USN-1735-1
- OpenJDK vulnerabilities
- 21 February 2013