Mailinglist Archive: opensuse-updates (64 mails)
< Previous | Next > |
openSUSE-SU-2014:1232-1: critical: mozilla-nss: update to avoid signature forgery
- From: opensuse-security@xxxxxxxxxxxx
- Date: Sun, 28 Sep 2014 12:07:03 +0200 (CEST)
- Message-id: <20140928100703.CB5DA3224A@maintenance.suse.de>
openSUSE Security Update: mozilla-nss: update to avoid signature forgery
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1232-1
Rating: critical
References: #897890
Cross-References: CVE-2014-1568
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
Mozilla NSS is vulnerable to a variant of a signature forgery attack
previously published by Daniel Bleichenbacher. This is due to lenient
parsing of ASN.1 values involved in a signature and could lead to the
forging of RSA certificates.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-562
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-562
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
libfreebl3-3.16.5-39.1
libfreebl3-debuginfo-3.16.5-39.1
libsoftokn3-3.16.5-39.1
libsoftokn3-debuginfo-3.16.5-39.1
mozilla-nss-3.16.5-39.1
mozilla-nss-certs-3.16.5-39.1
mozilla-nss-certs-debuginfo-3.16.5-39.1
mozilla-nss-debuginfo-3.16.5-39.1
mozilla-nss-debugsource-3.16.5-39.1
mozilla-nss-devel-3.16.5-39.1
mozilla-nss-sysinit-3.16.5-39.1
mozilla-nss-sysinit-debuginfo-3.16.5-39.1
mozilla-nss-tools-3.16.5-39.1
mozilla-nss-tools-debuginfo-3.16.5-39.1
- openSUSE 13.1 (x86_64):
libfreebl3-32bit-3.16.5-39.1
libfreebl3-debuginfo-32bit-3.16.5-39.1
libsoftokn3-32bit-3.16.5-39.1
libsoftokn3-debuginfo-32bit-3.16.5-39.1
mozilla-nss-32bit-3.16.5-39.1
mozilla-nss-certs-32bit-3.16.5-39.1
mozilla-nss-certs-debuginfo-32bit-3.16.5-39.1
mozilla-nss-debuginfo-32bit-3.16.5-39.1
mozilla-nss-sysinit-32bit-3.16.5-39.1
mozilla-nss-sysinit-debuginfo-32bit-3.16.5-39.1
- openSUSE 12.3 (i586 x86_64):
libfreebl3-3.16.5-1.55.1
libfreebl3-debuginfo-3.16.5-1.55.1
libsoftokn3-3.16.5-1.55.1
libsoftokn3-debuginfo-3.16.5-1.55.1
mozilla-nss-3.16.5-1.55.1
mozilla-nss-certs-3.16.5-1.55.1
mozilla-nss-certs-debuginfo-3.16.5-1.55.1
mozilla-nss-debuginfo-3.16.5-1.55.1
mozilla-nss-debugsource-3.16.5-1.55.1
mozilla-nss-devel-3.16.5-1.55.1
mozilla-nss-sysinit-3.16.5-1.55.1
mozilla-nss-sysinit-debuginfo-3.16.5-1.55.1
mozilla-nss-tools-3.16.5-1.55.1
mozilla-nss-tools-debuginfo-3.16.5-1.55.1
- openSUSE 12.3 (x86_64):
libfreebl3-32bit-3.16.5-1.55.1
libfreebl3-debuginfo-32bit-3.16.5-1.55.1
libsoftokn3-32bit-3.16.5-1.55.1
libsoftokn3-debuginfo-32bit-3.16.5-1.55.1
mozilla-nss-32bit-3.16.5-1.55.1
mozilla-nss-certs-32bit-3.16.5-1.55.1
mozilla-nss-certs-debuginfo-32bit-3.16.5-1.55.1
mozilla-nss-debuginfo-32bit-3.16.5-1.55.1
mozilla-nss-sysinit-32bit-3.16.5-1.55.1
mozilla-nss-sysinit-debuginfo-32bit-3.16.5-1.55.1
References:
http://support.novell.com/security/cve/CVE-2014-1568.html
https://bugzilla.suse.com/show_bug.cgi?id=897890
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1232-1
Rating: critical
References: #897890
Cross-References: CVE-2014-1568
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
Mozilla NSS is vulnerable to a variant of a signature forgery attack
previously published by Daniel Bleichenbacher. This is due to lenient
parsing of ASN.1 values involved in a signature and could lead to the
forging of RSA certificates.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-562
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-562
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
libfreebl3-3.16.5-39.1
libfreebl3-debuginfo-3.16.5-39.1
libsoftokn3-3.16.5-39.1
libsoftokn3-debuginfo-3.16.5-39.1
mozilla-nss-3.16.5-39.1
mozilla-nss-certs-3.16.5-39.1
mozilla-nss-certs-debuginfo-3.16.5-39.1
mozilla-nss-debuginfo-3.16.5-39.1
mozilla-nss-debugsource-3.16.5-39.1
mozilla-nss-devel-3.16.5-39.1
mozilla-nss-sysinit-3.16.5-39.1
mozilla-nss-sysinit-debuginfo-3.16.5-39.1
mozilla-nss-tools-3.16.5-39.1
mozilla-nss-tools-debuginfo-3.16.5-39.1
- openSUSE 13.1 (x86_64):
libfreebl3-32bit-3.16.5-39.1
libfreebl3-debuginfo-32bit-3.16.5-39.1
libsoftokn3-32bit-3.16.5-39.1
libsoftokn3-debuginfo-32bit-3.16.5-39.1
mozilla-nss-32bit-3.16.5-39.1
mozilla-nss-certs-32bit-3.16.5-39.1
mozilla-nss-certs-debuginfo-32bit-3.16.5-39.1
mozilla-nss-debuginfo-32bit-3.16.5-39.1
mozilla-nss-sysinit-32bit-3.16.5-39.1
mozilla-nss-sysinit-debuginfo-32bit-3.16.5-39.1
- openSUSE 12.3 (i586 x86_64):
libfreebl3-3.16.5-1.55.1
libfreebl3-debuginfo-3.16.5-1.55.1
libsoftokn3-3.16.5-1.55.1
libsoftokn3-debuginfo-3.16.5-1.55.1
mozilla-nss-3.16.5-1.55.1
mozilla-nss-certs-3.16.5-1.55.1
mozilla-nss-certs-debuginfo-3.16.5-1.55.1
mozilla-nss-debuginfo-3.16.5-1.55.1
mozilla-nss-debugsource-3.16.5-1.55.1
mozilla-nss-devel-3.16.5-1.55.1
mozilla-nss-sysinit-3.16.5-1.55.1
mozilla-nss-sysinit-debuginfo-3.16.5-1.55.1
mozilla-nss-tools-3.16.5-1.55.1
mozilla-nss-tools-debuginfo-3.16.5-1.55.1
- openSUSE 12.3 (x86_64):
libfreebl3-32bit-3.16.5-1.55.1
libfreebl3-debuginfo-32bit-3.16.5-1.55.1
libsoftokn3-32bit-3.16.5-1.55.1
libsoftokn3-debuginfo-32bit-3.16.5-1.55.1
mozilla-nss-32bit-3.16.5-1.55.1
mozilla-nss-certs-32bit-3.16.5-1.55.1
mozilla-nss-certs-debuginfo-32bit-3.16.5-1.55.1
mozilla-nss-debuginfo-32bit-3.16.5-1.55.1
mozilla-nss-sysinit-32bit-3.16.5-1.55.1
mozilla-nss-sysinit-debuginfo-32bit-3.16.5-1.55.1
References:
http://support.novell.com/security/cve/CVE-2014-1568.html
https://bugzilla.suse.com/show_bug.cgi?id=897890
< Previous | Next > |