Bugzilla – Bug 960996
VUL-0: CVE-2015-7575: SLOTH: Security Losses from Obsolete and Truncated Transcript Hashes
Last modified: 2020-04-23 11:58:18 UTC
Karthikeyan Bhargavan and Gaetan Leurent identified a new class of transcript collision attacks on popular cryptographic protocols such as TLS, IKE, and SSH, that significantly reduce their expected security. http://www.mitls.org/pages/attacks/SLOTH SLOTH - Security Losses from Obsolete and Truncated Transcript Hashes Technical Paper: Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH, Karthikeyan Bhargavan and Gaetan Leurent, Network and Distributed System Security Symposium (NDSS 2016) http://www.mitls.org/downloads/transcript-collisions.pdf CVE-2015-7575 "assigned protocol level CVE" Will use this bug as a master.
bugbot adjusting priority
mozilla nss is in bug 959888 openssl has this statement: openssl 0.9.8 is not affected as it does not implement TLS 1.2 openssl 1.0.1f and later are not affected. -> no SUSE version of openssl is affected at this time.
gnutls is tracked in bug 929690
Java tracked in bnc#962743
SUSE-SU-2016:0256-1: An update that fixes 8 vulnerabilities is now available. Category: security (critical) Bug References: 960996,962743 CVE References: CVE-2015-7575,CVE-2015-8126,CVE-2016-0402,CVE-2016-0448,CVE-2016-0466,CVE-2016-0475,CVE-2016-0483,CVE-2016-0494 Sources used: SUSE Linux Enterprise Server 12-SP1 (src): java-1_8_0-openjdk-1.8.0.72-3.2 SUSE Linux Enterprise Desktop 12-SP1 (src): java-1_8_0-openjdk-1.8.0.72-3.2
openSUSE-SU-2016:0263-1: An update that fixes 8 vulnerabilities is now available. Category: security (critical) Bug References: 960996,962743 CVE References: CVE-2015-7575,CVE-2015-8126,CVE-2015-8472,CVE-2016-0402,CVE-2016-0448,CVE-2016-0466,CVE-2016-0483,CVE-2016-0494 Sources used: openSUSE 13.2 (src): java-1_8_0-openjdk-1.8.0.72-21.1
SUSE-SU-2016:0265-1: An update that fixes 9 vulnerabilities is now available. Category: security (critical) Bug References: 939523,960996,962743 CVE References: CVE-2015-4871,CVE-2015-7575,CVE-2015-8126,CVE-2015-8472,CVE-2016-0402,CVE-2016-0448,CVE-2016-0466,CVE-2016-0483,CVE-2016-0494 Sources used: SUSE Linux Enterprise Server 12-SP1 (src): java-1_7_0-openjdk-1.7.0.95-24.2 SUSE Linux Enterprise Server 12 (src): java-1_7_0-openjdk-1.7.0.95-24.2 SUSE Linux Enterprise Desktop 12-SP1 (src): java-1_7_0-openjdk-1.7.0.95-24.2 SUSE Linux Enterprise Desktop 12 (src): java-1_7_0-openjdk-1.7.0.95-24.2
openSUSE-SU-2016:0268-1: An update that fixes 9 vulnerabilities is now available. Category: security (critical) Bug References: 939523,960996,962743 CVE References: CVE-2015-4871,CVE-2015-7575,CVE-2015-8126,CVE-2015-8472,CVE-2016-0402,CVE-2016-0448,CVE-2016-0466,CVE-2016-0483,CVE-2016-0494 Sources used: openSUSE 13.2 (src): java-1_7_0-openjdk-1.7.0.95-16.1, java-1_7_0-openjdk-bootstrap-1.7.0.95-16.1
SUSE-SU-2016:0269-1: An update that fixes 9 vulnerabilities is now available. Category: security (critical) Bug References: 960996,962743 CVE References: CVE-2015-4871,CVE-2015-7575,CVE-2015-8126,CVE-2015-8472,CVE-2016-0402,CVE-2016-0448,CVE-2016-0466,CVE-2016-0483,CVE-2016-0494 Sources used: SUSE Linux Enterprise Desktop 11-SP4 (src): java-1_7_0-openjdk-1.7.0.95-0.17.2 SUSE Linux Enterprise Desktop 11-SP3 (src): java-1_7_0-openjdk-1.7.0.95-0.17.2 SUSE Linux Enterprise Debuginfo 11-SP4 (src): java-1_7_0-openjdk-1.7.0.95-0.17.2 SUSE Linux Enterprise Debuginfo 11-SP3 (src): java-1_7_0-openjdk-1.7.0.95-0.17.2
openSUSE-SU-2016:0270-1: An update that fixes 32 vulnerabilities is now available. Category: security (critical) Bug References: 951376,960996,962743 CVE References: CVE-2015-4734,CVE-2015-4803,CVE-2015-4805,CVE-2015-4806,CVE-2015-4810,CVE-2015-4835,CVE-2015-4840,CVE-2015-4842,CVE-2015-4843,CVE-2015-4844,CVE-2015-4860,CVE-2015-4868,CVE-2015-4872,CVE-2015-4881,CVE-2015-4882,CVE-2015-4883,CVE-2015-4893,CVE-2015-4901,CVE-2015-4902,CVE-2015-4903,CVE-2015-4906,CVE-2015-4908,CVE-2015-4911,CVE-2015-4916,CVE-2015-7575,CVE-2015-8126,CVE-2015-8472,CVE-2016-0402,CVE-2016-0448,CVE-2016-0466,CVE-2016-0483,CVE-2016-0494 Sources used: openSUSE Leap 42.1 (src): java-1_8_0-openjdk-1.8.0.72-6.1
openSUSE-SU-2016:0279-1: An update that fixes 9 vulnerabilities is now available. Category: security (critical) Bug References: 939523,960996,962743 CVE References: CVE-2015-4871,CVE-2015-7575,CVE-2015-8126,CVE-2015-8472,CVE-2016-0402,CVE-2016-0448,CVE-2016-0466,CVE-2016-0483,CVE-2016-0494 Sources used: openSUSE Leap 42.1 (src): java-1_7_0-openjdk-1.7.0.95-25.1, java-1_7_0-openjdk-bootstrap-1.7.0.95-25.1
Done