Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2015-2808

Publication date 31 March 2015

Last updated 24 July 2024


Ubuntu priority

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

Read the notes from the security team

Status

Package Ubuntu Release Status
openjdk-6 15.10 wily
Not affected
15.04 vivid
Fixed 6b36-1.13.8-0ubuntu1~15.04.1
14.10 utopic Ignored end of life
14.04 LTS trusty
Fixed 6b36-1.13.8-0ubuntu1~14.04
12.04 LTS precise
Fixed 6b36-1.13.8-0ubuntu1~12.04
openjdk-7 15.10 wily
Not affected
15.04 vivid
Fixed 7u79-2.5.6-0ubuntu1.15.04.1
14.10 utopic Ignored end of life
14.04 LTS trusty
Fixed 7u79-2.5.6-0ubuntu1.14.04.1
12.04 LTS precise
Fixed 7u79-2.5.6-0ubuntu1.12.04.1
openjdk-8 15.10 wily
Fixed 8u66-b17-1
15.04 vivid Ignored end of life
14.10 utopic Ignored end of life
14.04 LTS trusty Not in release
12.04 LTS precise Not in release

Notes


tyhicks

This is an RC4 protocol flaw and it is not specific to an Ubuntu package

References

Related Ubuntu Security Notices (USN)

    • 2696-1
    • OpenJDK 7 vulnerabilities
    • 30 July 2015
    • USN-2706-1
    • OpenJDK 6 vulnerabilities
    • 6 August 2015
    • USN-2696-1
    • OpenJDK 7 vulnerabilities
    • 30 July 2015

Other references