Описание
Security update for mbedtls
This update to mbedtls 1.3.16 fixes the following security issues:
- CVE-2015-7575: Disables by default MD5 handshake signatures in TLS 1.2 to prevent the SLOTH attack on TLS 1.2 server authentication (boo#961284)
- boo#961290: potential double free during certificate generation
Список пакетов
openSUSE Leap 42.1
libmbedtls9-1.3.16-9.1
libmbedtls9-32bit-1.3.16-9.1
mbedtls-1.3.16-9.1
mbedtls-devel-1.3.16-9.1
Ссылки
- E-Mail link for openSUSE-SU-2016:0162-1
- SUSE Security Ratings
Описание
Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
Затронутые продукты
openSUSE Leap 42.1:libmbedtls9-1.3.16-9.1
openSUSE Leap 42.1:libmbedtls9-32bit-1.3.16-9.1
openSUSE Leap 42.1:mbedtls-1.3.16-9.1
openSUSE Leap 42.1:mbedtls-devel-1.3.16-9.1
Ссылки
- CVE-2015-7575
- SUSE Bug 959888
- SUSE Bug 960402
- SUSE Bug 960996
- SUSE Bug 961280
- SUSE Bug 961281
- SUSE Bug 961282
- SUSE Bug 961283
- SUSE Bug 961284
- SUSE Bug 961290
- SUSE Bug 961357
- SUSE Bug 962743
- SUSE Bug 963937
- SUSE Bug 967521
- SUSE Bug 981087