|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2015-7575: mozilla-nss: TLS 1.2 RSA-MD5 downgrade attack (SLOTH) | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Marcus Meissner <meissner> |
| Component: | Incidents | Assignee: | Petr Cerny <pcerny> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | astieger, jsegitz, pcerny, smash_bz, wolfgang |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | CVSSv2:SUSE:CVE-2015-7575:4.3:(AV:N/AC:M/Au:N/C:P/I:N/A:N) maint:released:sle10-sp3:62400 maint:running:62384:moderate | ||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Bug Depends on: | |||
| Bug Blocks: | 960996 | ||
| Deadline: | 2016-01-06 | ||
| Attachments: | CVE-2015-7575.patch | ||
|
Comment 1
Swamp Workflow Management
2015-12-21 23:00:14 UTC
Created attachment 660286 [details]
CVE-2015-7575.patch
On openSUSE, affects all releases (3.20.1), target version is 3.20.2. An update workflow for this issue was started. This issue was rated as "moderate". Please submit fixed packages until "Jan. 6, 2016". When done, reassign the bug to "security-team@suse.de". /update/121199/. An update workflow for this issue was started. This issue was rated as "moderate". Please submit fixed packages until "Jan. 6, 2016". When done, reassign the bug to "security-team@suse.de". /update/121200/. An update workflow for this issue was started. This issue was rated as "moderate". Please submit fixed packages until "Jan. 6, 2016". When done, reassign the bug to "security-team@suse.de". /update/121201/. An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2016-01-06. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62383 An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2016-01-06. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62384 This is an autogenerated message for OBS integration: This bug (959888) was mentioned in https://build.opensuse.org/request/show/350520 Factory / mozilla-nss I think this has been published now: https://www.mozilla.org/en-US/security/advisories/mfsa2015-150/ This is an autogenerated message for OBS integration: This bug (959888) was mentioned in https://build.opensuse.org/request/show/350831 42.1 / mozilla-nss https://build.opensuse.org/request/show/350832 13.2 / mozilla-nss https://build.opensuse.org/request/show/350833 13.1 / mozilla-nss Security researcher Karthikeyan Bhargavan reported an issue in Network Security Services (NSS) where MD5 signatures in the server signature within the TLS 1.2 ServerKeyExchange message are still accepted. This is an issue since NSS has officially disallowed the accepting MD5 as a hash algorithm in signatures since 2011. This issues exposes NSS based clients such as Firefox to theoretical collision-based forgery attacks. This issue was fixed in NSS version 3.20.2. https://bugzilla.mozilla.org/show_bug.cgi?id=1158489 While the MFSA has been retracted, it's text/subject and CVE number can be considered public (e.g. through Google cache). Also the upstream code release is released. We will handle accordingly in both SLE and openSUSE where we decide to release the full upstream version. openSUSE-SU-2015:2405-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 959888 CVE References: CVE-2015-7575 Sources used: openSUSE Leap 42.1 (src): mozilla-nss-3.20.2-6.1 openSUSE 13.2 (src): mozilla-nss-3.20.2-22.1 openSUSE 13.1 (src): mozilla-nss-3.20.2-65.1 openSUSE-SU-2016:0007-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 959888 CVE References: CVE-2015-7575 Sources used: openSUSE Leap 42.1 (src): MozillaFirefox-43.0.3-9.2 openSUSE 13.2 (src): MozillaFirefox-43.0.3-56.1 openSUSE 13.1 (src): MozillaFirefox-43.0.3-100.1 http://www.mitls.org/pages/attacks/SLOTH SLOTH - Security Losses from Obsolete and Truncated Transcript Hashes Technical Paper: Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH, Karthikeyan Bhargavan and Gaetan Leurent, Network and Distributed System Security Symposium (NDSS 2016) http://www.mitls.org/downloads/transcript-collisions.pdf CVE-2015-7575 "assigned protocol level CVE" Removed alias to use it on tracker bug for SLOTH SUSE-SU-2016:0149-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 959888 CVE References: CVE-2015-7575 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP1 (src): mozilla-nss-3.19.2.2-32.1 SUSE Linux Enterprise Software Development Kit 12 (src): mozilla-nss-3.19.2.2-32.1 SUSE Linux Enterprise Server 12-SP1 (src): mozilla-nss-3.19.2.2-32.1 SUSE Linux Enterprise Server 12 (src): mozilla-nss-3.19.2.2-32.1 SUSE Linux Enterprise Desktop 12-SP1 (src): mozilla-nss-3.19.2.2-32.1 SUSE Linux Enterprise Desktop 12 (src): mozilla-nss-3.19.2.2-32.1 SUSE-SU-2016:0189-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 959888 CVE References: CVE-2015-7575 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): mozilla-nss-3.19.2.2-22.1 SUSE Linux Enterprise Software Development Kit 11-SP3 (src): mozilla-nss-3.19.2.2-22.1 SUSE Linux Enterprise Server for VMWare 11-SP3 (src): mozilla-nss-3.19.2.2-22.1 SUSE Linux Enterprise Server 11-SP4 (src): mozilla-nss-3.19.2.2-22.1 SUSE Linux Enterprise Server 11-SP3 (src): mozilla-nss-3.19.2.2-22.1 SUSE Linux Enterprise Desktop 11-SP4 (src): mozilla-nss-3.19.2.2-22.1 SUSE Linux Enterprise Desktop 11-SP3 (src): mozilla-nss-3.19.2.2-22.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): mozilla-nss-3.19.2.2-22.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): mozilla-nss-3.19.2.2-22.1 All done SUSE-SU-2016:0584-1: An update that solves 5 vulnerabilities and has two fixes is now available. Category: security (moderate) Bug References: 954447,959888,963520,963632,963635,963731,967087 CVE References: CVE-2015-7575,CVE-2016-1523,CVE-2016-1930,CVE-2016-1935,CVE-2016-1938 Sources used: SUSE Linux Enterprise Server 11-SP2-LTSS (src): MozillaFirefox-38.6.1esr-33.1, MozillaFirefox-branding-SLED-38-15.58, mozilla-nss-3.20.2-17.5 SUSE Linux Enterprise Debuginfo 11-SP2 (src): MozillaFirefox-38.6.1esr-33.1, mozilla-nss-3.20.2-17.5 |