Описание
Security update for apache2-mod_nss
This update provides apache2-mod_nss 1.0.14, which brings several fixes and enhancements:
- SHA256 cipher names change spelling from *_sha256 to *_sha_256.
- Drop mod_nss_migrate.pl and use upstream migrate script instead.
- Check for Apache user owner/group read permissions of NSS database at startup.
- Update default ciphers to something more modern and secure.
- Check for host and netstat commands in gencert before trying to use them.
- Don't ignore NSSProtocol when NSSFIPS is enabled.
- Use proper shell syntax to avoid creating /0 in gencert.
- Add server support for DHE ciphers.
- Extract SAN from server/client certificates into env.
- Fix memory leaks and other coding issues caught by clang analyzer.
- Add support for Server Name Indication (SNI)
- Add support for SNI for reverse proxy connections.
- Add RenegBufferSize? option.
- Add support for TLS Session Tickets (RFC 5077).
- Implement a slew more OpenSSL cipher macros.
- Fix a number of illegal memory accesses and memory leaks.
- Support for SHA384 ciphers if they are available in the version of NSS mod_nss is built against.
- Add the SECURE_RENEG environment variable.
- Add some hints when NSS database cannot be initialized.
- Code cleanup including trailing whitespace and compiler warnings.
- Modernize autotools configuration slightly, add config.h.
- Add small test suite for SNI.
- Add compatibility for mod_ssl-style cipher definitions.
- Add Camelia ciphers.
- Remove Fortezza ciphers.
- Add TLSv1.2-specific ciphers.
- Initialize cipher list when re-negotiating handshake.
- Completely remove support for SSLv2.
- Add support for sqlite NSS databases.
- Compare subject CN and VS hostname during server start up.
- Add support for enabling TLS v1.2.
- Don't enable SSL 3 by default. (CVE-2014-3566)
- Improve protocol testing.
- Add nss_pcache man page.
- Fix argument handling in nss_pcache.
- Support httpd 2.4+.
- Allow users to configure a helper to ask for certificate passphrases via NSSPassPhraseDialog. (bsc#975394)
Список пакетов
SUSE Linux Enterprise Point of Sale 11 SP3
apache2-mod_nss-1.0.14-0.4.25.1
SUSE Linux Enterprise Server 11 SP2-LTSS
apache2-mod_nss-1.0.14-0.4.25.1
SUSE Linux Enterprise Server 11 SP3-LTSS
apache2-mod_nss-1.0.14-0.4.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA
apache2-mod_nss-1.0.14-0.4.25.1
SUSE Linux Enterprise Server 11 SP4
apache2-mod_nss-1.0.14-0.4.25.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4
apache2-mod_nss-1.0.14-0.4.25.1
SUSE Manager 2.1
apache2-mod_nss-1.0.14-0.4.25.1
SUSE Manager Proxy 2.1
apache2-mod_nss-1.0.14-0.4.25.1
SUSE OpenStack Cloud 5
apache2-mod_nss-1.0.14-0.4.25.1
Ссылки
- Link for SUSE-SU-2016:2329-1
- E-Mail link for SUSE-SU-2016:2329-1
- SUSE Security Ratings
- SUSE Bug 975394
- SUSE Bug 979688
- SUSE CVE CVE-2013-4566 page
- SUSE CVE CVE-2014-3566 page
Описание
mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.
Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:apache2-mod_nss-1.0.14-0.4.25.1
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_nss-1.0.14-0.4.25.1
SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-mod_nss-1.0.14-0.4.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-mod_nss-1.0.14-0.4.25.1
Ссылки
- CVE-2013-4566
- SUSE Bug 853039
Описание
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:apache2-mod_nss-1.0.14-0.4.25.1
SUSE Linux Enterprise Server 11 SP2-LTSS:apache2-mod_nss-1.0.14-0.4.25.1
SUSE Linux Enterprise Server 11 SP3-LTSS:apache2-mod_nss-1.0.14-0.4.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-mod_nss-1.0.14-0.4.25.1
Ссылки
- CVE-2014-3566
- SUSE Bug 1011293
- SUSE Bug 1031023
- SUSE Bug 901223
- SUSE Bug 901254
- SUSE Bug 901277
- SUSE Bug 901748
- SUSE Bug 901757
- SUSE Bug 901759
- SUSE Bug 901889
- SUSE Bug 901968
- SUSE Bug 902229
- SUSE Bug 902233
- SUSE Bug 902476
- SUSE Bug 903405
- SUSE Bug 903684
- SUSE Bug 904889
- SUSE Bug 905106
- SUSE Bug 914041
- SUSE Bug 994144