Bug 932026 - VUL-0: gnutls: The Logjam Attack / weakdh.org
VUL-0: gnutls: The Logjam Attack / weakdh.org
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Major
: ---
Assigned To: Security Team bot
Security Team bot
maint:released:sle10-sp3:62243
:
Depends on: CVE-2015-4000
Blocks:
  Show dependency treegraph
 
Reported: 2015-05-22 12:40 UTC by Marcus Meissner
Modified: 2015-09-22 11:26 UTC (History)
10 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2015-05-22 12:40:00 UTC
+++ This bug was initially created as a clone of Bug #931600 +++

This is the gnutls tracking bug for Logjam.
Comment 1 Swamp Workflow Management 2015-05-22 22:00:55 UTC
bugbot adjusting priority
Comment 2 Andreas Stieger 2015-07-17 12:41:33 UTC
The upstream discussion is at http://lists.gnutls.org/pipermail/gnutls-devel/2015-May/007597.html

The default in HEAD seems to be 1008.
Look at gnutls_dh_set_prime_bits which may allow downgrades.

There does not seem to be an upstream change.
Comment 3 Vítězslav Čížek 2015-07-31 12:29:42 UTC
The default on SLE-12 for NORMAL security level is 767.
SLE 10 and 11 default (for NORMAL) to 727, but the command line tool hardcodes 512 as the minimum.

I'll change gnutls-cli to use the default limit.
Is the default otherwise acceptable, or should we go higher like we did with openssl?
Comment 4 Marcus Meissner 2015-07-31 12:39:43 UTC
we can bump the gnutls cli limit to the default limit.

i would not go higher right now.
Comment 8 Swamp Workflow Management 2015-08-04 07:26:21 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2015-08-18.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/62242
Comment 9 Swamp Workflow Management 2015-09-10 11:11:04 UTC
SUSE-SU-2015:1526-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 925499,932026
CVE References: CVE-2015-4000
Sources used:
SUSE Linux Enterprise Software Development Kit 11-SP4 (src):    gnutls-2.4.1-24.39.57.1
SUSE Linux Enterprise Software Development Kit 11-SP3 (src):    gnutls-2.4.1-24.39.57.1
SUSE Linux Enterprise Server for VMWare 11-SP3 (src):    gnutls-2.4.1-24.39.57.1
SUSE Linux Enterprise Server 11-SP4 (src):    gnutls-2.4.1-24.39.57.1
SUSE Linux Enterprise Server 11-SP3 (src):    gnutls-2.4.1-24.39.57.1
SUSE Linux Enterprise High Availability Extension 11-SP4 (src):    gnutls-2.4.1-24.39.57.1
SUSE Linux Enterprise High Availability Extension 11-SP3 (src):    gnutls-2.4.1-24.39.57.1
SUSE Linux Enterprise Desktop 11-SP4 (src):    gnutls-2.4.1-24.39.57.1
SUSE Linux Enterprise Desktop 11-SP3 (src):    gnutls-2.4.1-24.39.57.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    gnutls-2.4.1-24.39.57.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    gnutls-2.4.1-24.39.57.1
Comment 10 Marcus Meissner 2015-09-10 12:09:21 UTC
released