Heartbleed Bug

Bug #1304651 reported by intel352
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
openssl (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

CVE-2014-0160

http://heartbleed.com/

Current version of openssl packaged for Ubuntu is 1.0.1f, need to upgrade to 1.0.1g, and need backports for legacy systems. This is a pretty serious bug...

CVE References

Revision history for this message
intel352 (intel352) wrote :

Set privacy to Public, as this is an already disclosed issue.

information type: Private Security → Public
Revision history for this message
intel352 (intel352) wrote :

Nevermind, need to close this. Ubuntu has already addressed, the package versioning was misleading (to me at least): http://www.ubuntu.com/usn/usn-2165-1/

Changed in openssl (Ubuntu):
status: New → Fix Released
Revision history for this message
James Lewis (james-fsck) wrote :

14.04 is released in 2 days but this fix does not seem to be applied... the USN notification lists only up to 13.10, but as of today:-

james@trinity:~$ openssl version
OpenSSL 1.0.1f 6 Jan 2014

james@trinity:~$ date
Tue Apr 15 16:56:45 BST 2014

james@trinity:~$ more /etc/lsb-release
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=14.04
DISTRIB_CODENAME=trusty
DISTRIB_DESCRIPTION="Ubuntu 14.04 LTS"
james@trinity:~$

Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

Heartbleed was fixed in Ubuntu 14.04 by the 1.0.1f-1ubuntu2 package that I uploaded on April 7th.

From the changelog:

openssl (1.0.1f-1ubuntu2) trusty; urgency=medium

  * SECURITY UPDATE: side-channel attack on Montgomery ladder implementation
    - debian/patches/CVE-2014-0076.patch: add and use constant time swap in
      crypto/bn/bn.h, crypto/bn/bn_lib.c, crypto/ec/ec2_mult.c,
      util/libeay.num.
    - CVE-2014-0076
  * SECURITY UPDATE: memory disclosure in TLS heartbeat extension
    - debian/patches/CVE-2014-0160.patch: use correct lengths in
      ssl/d1_both.c, ssl/t1_lib.c.
    - CVE-2014-0160

 -- Marc Deslauriers <email address hidden> Mon, 07 Apr 2014 15:37:53 -0400

Revision history for this message
James Lewis (james-fsck) wrote :

OK, apt-get changelog openssl shows that there is a backported fix (I hate backported fixes because it makes it very hard to know if you have a vulnerable version or not)...

I imagine having your version labeled 1.0.1f and dated in January will probably generate more than a few support calls I think!?

Revision history for this message
intel352 (intel352) wrote :

Re: james-fsck, that's the same issue that caused me to log this ticket in the first place, as the backported versions didn't make it apparent that they were up-to-date (neither version or date reflect it). Quite misleading.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.