Bugzilla – Bug 938945
VUL-1: libtcnative-1-0: The Logjam Attack / weakdh.org
Last modified: 2018-09-12 12:35:24 UTC
+++ This bug was initially created as a clone of Bug #931600 +++ libtcnative-1-0 generates DH parameters of 512 bits when using a 512bit RSA key. jni/native/src/sslutils.c DH *SSL_callback_tmp_DH(SSL *ssl, int export, int keylen) { int idx; switch (keylen) { case 512: idx = SSL_TMP_KEY_DH_512; break; case 2048: idx = SSL_TMP_KEY_DH_2048; break; case 4096: idx = SSL_TMP_KEY_DH_4096; break; case 1024: default: idx = SSL_TMP_KEY_DH_1024; break; } return (DH *)SSL_temp_keys[idx]; } easiest solution would be to remove the lines: case 512: idx = SSL_TMP_KEY_DH_512; break; and fall back to the 1024 bit key.
I am not planning to request an update for this. Whoever uses 512bit RSA keys has likely not updated from sles 7. But keep it on planned for next update.
bugbot adjusting priority
SUSE-SU-2016:2209-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 938945 CVE References: CVE-2015-4000 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP1 (src): libtcnative-1-0-1.1.32-9.1 SUSE Linux Enterprise Server 12-SP1 (src): libtcnative-1-0-1.1.32-9.1
openSUSE-SU-2016:2267-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 938945 CVE References: CVE-2015-4000 Sources used: openSUSE Leap 42.1 (src): libtcnative-1-0-1.1.32-7.1
released the interesting parts.
SUSE-SU-2016:2385-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 938945 CVE References: CVE-2015-4000 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): libtcnative-1-0-1.3.3-12.4.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): libtcnative-1-0-1.3.3-12.4.1