SUSE Security Update: Security update for mozilla-nss
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1220-1
Rating: important
References: #897890
Cross-References: CVE-2014-1568
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available. It
includes one version update.
Description:
Mozilla NSS was updated to version 3.16.5 to fix a RSA certificate forgery
issue.
MFSA 2014-73 / CVE-2014-1568: Antoine Delignat-Lavaud, security researcher
at Inria Paris in team Prosecco, reported an issue in Network Security
Services (NSS) libraries affecting all versions. He discovered that NSS is
vulnerable to a variant of a signature forgery attack previously published
by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values
involved in a signature and could lead to the forging of RSA certificates.
The Advanced Threat Research team at Intel Security also independently
discovered and reported this issue.
Security Issues:
* CVE-2014-1568
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-libfreebl3-9777
– SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-libfreebl3-9777
– SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-libfreebl3-9777
– SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-libfreebl3-9777
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.16.5]:
mozilla-nss-devel-3.16.5-0.7.1
– SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 3.16.5]:
libfreebl3-3.16.5-0.7.1
libsoftokn3-3.16.5-0.7.1
mozilla-nss-3.16.5-0.7.1
mozilla-nss-tools-3.16.5-0.7.1
– SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64) [New Version: 3.16.5]:
libfreebl3-32bit-3.16.5-0.7.1
libsoftokn3-32bit-3.16.5-0.7.1
mozilla-nss-32bit-3.16.5-0.7.1
– SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.16.5]:
libfreebl3-3.16.5-0.7.1
libsoftokn3-3.16.5-0.7.1
mozilla-nss-3.16.5-0.7.1
mozilla-nss-tools-3.16.5-0.7.1
– SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64) [New Version: 3.16.5]:
libfreebl3-32bit-3.16.5-0.7.1
libsoftokn3-32bit-3.16.5-0.7.1
mozilla-nss-32bit-3.16.5-0.7.1
– SUSE Linux Enterprise Server 11 SP3 (ia64) [New Version: 3.16.5]:
libfreebl3-x86-3.16.5-0.7.1
libsoftokn3-x86-3.16.5-0.7.1
mozilla-nss-x86-3.16.5-0.7.1
– SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 3.16.5]:
libfreebl3-3.16.5-0.7.1
libsoftokn3-3.16.5-0.7.1
mozilla-nss-3.16.5-0.7.1
mozilla-nss-tools-3.16.5-0.7.1
– SUSE Linux Enterprise Desktop 11 SP3 (x86_64) [New Version: 3.16.5]:
libfreebl3-32bit-3.16.5-0.7.1
libsoftokn3-32bit-3.16.5-0.7.1
mozilla-nss-32bit-3.16.5-0.7.1
References:
http://support.novell.com/security/cve/CVE-2014-1568.html
https://bugzilla.suse.com/897890
http://download.suse.com/patch/finder/?keywords=9099e9b629979a0004c403f74aace0f2
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for mozilla-nss
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1220-2
Rating: important
References: #897890
Cross-References: CVE-2014-1568
Affected Products:
SUSE Linux Enterprise Server 11 SP2 LTSS
______________________________________________________________________________
An update that fixes one vulnerability is now available. It
includes one version update.
Description:
Mozilla NSS was updated to 3.16.5 to fix a RSA certificate forgery issue.
MFSA 2014-73 / CVE-2014-1568: Antoine Delignat-Lavaud, security researcher
at Inria Paris in team Prosecco, reported an issue in Network Security
Services (NSS) libraries affecting all versions. He discovered that NSS is
vulnerable to a variant of a signature forgery attack previously published
by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values
involved in a signature and could lead to the forging of RSA certificates.
The Advanced Threat Research team at Intel Security also independently
discovered and reported this issue.
Security Issues:
* CVE-2014-1568
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 11 SP2 LTSS:
zypper in -t patch slessp2-libfreebl3-9774
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64) [New Version: 3.16.5]:
libfreebl3-3.16.5-0.4.2.1
mozilla-nss-3.16.5-0.4.2.1
mozilla-nss-devel-3.16.5-0.4.2.1
mozilla-nss-tools-3.16.5-0.4.2.1
– SUSE Linux Enterprise Server 11 SP2 LTSS (s390x x86_64) [New Version: 3.16.5]:
libfreebl3-32bit-3.16.5-0.4.2.1
mozilla-nss-32bit-3.16.5-0.4.2.1
References:
http://support.novell.com/security/cve/CVE-2014-1568.html
https://bugzilla.suse.com/show_bug.cgi?id=897890
http://download.suse.com/patch/finder/?keywords=d63b0bfb5e439b036b903e3aa94555ff
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for mozilla-nss
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1220-3
Rating: important
References: #897890
Cross-References: CVE-2014-1568
Affected Products:
SUSE Linux Enterprise Server 11 SP1 LTSS
SUSE Linux Enterprise Server 10 SP3 LTSS
______________________________________________________________________________
An update that fixes one vulnerability is now available. It
includes one version update.
Description:
Mozilla NSS was updated to version 3.16.5 to fix a RSA certificate forgery
issue.
MFSA 2014-73 / CVE-2014-1568: Antoine Delignat-Lavaud, security researcher
at Inria Paris in team Prosecco, reported an issue in Network Security
Services (NSS) libraries affecting all versions. He discovered that NSS is
vulnerable to a variant of a signature forgery attack previously published
by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values
involved in a signature and could lead to the forging of RSA certificates.
The Advanced Threat Research team at Intel Security also independently
discovered and reported this issue.
Security Issues:
* CVE-2014-1568
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 11 SP1 LTSS:
zypper in -t patch slessp1-libfreebl3-9775
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 3.16.5]:
libfreebl3-3.16.5-0.4.2.1
mozilla-nss-3.16.5-0.4.2.1
mozilla-nss-tools-3.16.5-0.4.2.1
– SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64) [New Version: 3.16.5]:
libfreebl3-32bit-3.16.5-0.4.2.1
mozilla-nss-32bit-3.16.5-0.4.2.1
– SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64) [New Version: 3.16.5]:
mozilla-nss-3.16.5-0.5.1
mozilla-nss-devel-3.16.5-0.5.1
mozilla-nss-tools-3.16.5-0.5.1
– SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64) [New Version: 3.16.5]:
mozilla-nss-32bit-3.16.5-0.5.1
References:
http://support.novell.com/security/cve/CVE-2014-1568.html
https://bugzilla.suse.com/show_bug.cgi?id=897890
http://download.suse.com/patch/finder/?keywords=2ee24d8f2ff89770e348b8257c89f70f
http://download.suse.com/patch/finder/?keywords=c6f6720a0652853ecb54d85b96a518b7
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for mozilla-nss
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1220-4
Rating: important
References: #897890
Cross-References: CVE-2014-1568
Affected Products:
SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________
An update that fixes one vulnerability is now available. It
includes one version update.
Description:
Mozilla NSS was updated to version 3.16.5 to fix a RSA certificate forgery
issue.
MFSA 2014-73 / CVE-2014-1568: Antoine Delignat-Lavaud, security researcher
at Inria Paris in team Prosecco, reported an issue in Network Security
Services (NSS) libraries affecting all versions. He discovered that NSS is
vulnerable to a variant of a signature forgery attack previously published
by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values
involved in a signature and could lead to the forging of RSA certificates.
The Advanced Threat Research team at Intel Security also independently
discovered and reported this issue.
Security Issues:
* CVE-2014-1568
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568>
Package List:
– SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64) [New Version: 3.16.5]:
mozilla-nss-3.16.5-0.5.1
mozilla-nss-devel-3.16.5-0.5.1
mozilla-nss-tools-3.16.5-0.5.1
– SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64) [New Version: 3.16.5]:
mozilla-nss-32bit-3.16.5-0.5.1
References:
http://support.novell.com/security/cve/CVE-2014-1568.html
https://bugzilla.suse.com/show_bug.cgi?id=897890
http://download.suse.com/patch/finder/?keywords=1e00d26644326f6d8943bad777904cab
— To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
$downloadlink = get_field('download_link'); ?>