[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 507-1] nss security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : nss
Version        : 2:3.14.5-1+deb7u7
CVE ID         : CVE-2015-4000
Debian Bug     : N/A

A vulnerability has been found in nss.

CVE-2015-4000

 With TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is
 enabled on a server but not on a client, does not properly convey
 a DHE_EXPORT choice, which allows man-in-the-middle attackers to
 conduct cipher-downgrade attacks by rewriting a ClientHello with
 DHE replaced by DHE_EXPORT and then rewriting a ServerHello with
 DHE_EXPORT replaced by DHE, aka the "Logjam" issue.

The solution in nss was to not accept bit lengths less than 1024.
This may potentially be a backwards incompatibility issue but such
low bit lengths should not be in use so it was deemed acceptable.

For Debian 7 "Wheezy", these problems have been fixed in version
2:3.14.5-1+deb7u7.

We recommend that you upgrade your nss packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -- 
 --------------------- Ola Lundqvist ---------------------------
/  opal@debian.org                     Folkebogatan 26          \
|  ola@inguza.com                      654 68 KARLSTAD          |
|  http://inguza.com/                  +46 (0)70-332 1551       |
\  gpg/f.p.: 22F2 32C6 B1E0 F4BF 2B26  0A6A 5E90 DCFA 9426 876F /
 ---------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBCAAGBQJXVps6AAoJEF6Q3PqUJodvwUwP/ivLYufklsqFh1/W34MHrcm4
N/hiwwCSZTIxkjkWTfsdgLNQ496nHqTvFDMAmGsi5jD0d1pwAX35vfdc0mxIOFXG
STkFBH1qD2Y/+ObNXMPxu8W0ta3z18Ke9ErqJofzlq+krzXb3NxHfFAejvbMexlm
Dt/oLKdGdaoPZis1IB5ye3I0iJvC7562uD6F437D32nIrWim4bFF3X//a+7l3Xms
DutWbZ8RG3Oe1CXaQYnLUiKnuE45HQ41rzIt9hrt2gcS766eW7IW99Z2j+a/YkDQ
eLscShCSmCsurS1b47yKUjfoDZQGCCnrA+JQwYxR4g2hvfbV794cf2a49fvnxGNL
aK8GbO/PulL0EjVOtwhCJv2dF1WwL2UvgWx4d511mrK3q1bVAjYje2gwLdO+YY6q
TFwuTsZP7zaKvcGx0FBiYJFkgtO5lzvQkmXIwTr106AewjHtOyUdcKyrl5bJczEO
HMY5cMl9VWiQcmGFp5s3QfucgL10EjNTKWog0LcHty9vhm87ckS1WrYuhOS6sIb2
6dCL4sv7TLZhm+zMT8QHAccvws+wUzdlSKC2UEeSnxp79IGg5Xf1rc8imGCYgBYe
BdkdZnweCEQ1avcl/wbICAK9GJtZlmgnHG26SDGPak4dA5ZuWbITFORcyBPXYzK6
TKAODDDd5NJYK8U7vZv6
=72yt
-----END PGP SIGNATURE-----


Reply to: