Linux Security
    Linux Security
    Linux Security

    Debian: DSA-2123-1: New NSS packages fix cryptographic weaknesses

    Date 01 Nov 2010
    Posted By LinuxSecurity Advisories
    Several vulnerabilities have been discovered in Mozilla's Network Security Services (NSS) library. The Common Vulnerabilities and Exposures project identifies the following problems:
    Hash: SHA1
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-2123-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                           Florian Weimer
    November 01, 2010           
    - ------------------------------------------------------------------------
    Package        : nss
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE Id(s)      : CVE-2010-3170 CVE-2010-3173
    Several vulnerabilities have been discovered in Mozilla's Network
    Security Services (NSS) library.  The Common Vulnerabilities and
    Exposures project identifies the following problems:
    	NSS recognizes a wildcard IP address in the subject's Common
    	Name field of an X.509 certificate, which might allow
    	man-in-the-middle attackers to spoof arbitrary SSL servers via
    	a crafted certificate issued by a legitimate Certification
    	NSS does not properly set the minimum key length for
    	Diffie-Hellman Ephemeral (DHE) mode, which makes it easier for
    	remote attackers to defeat cryptographic protection mechanisms
    	via a brute-force attack.
    For the stable distribution (lenny), these problems have been fixed in
    For the unstable distribution (sid) and the upcoming stable
    distribution (squeeze), these problems have been fixed in version
    We recommend that you upgrade your NSS packages.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    Source archives:
        Size/MD5 checksum:     1394 908a5e77c32e84069883a3cfb836eb24
        Size/MD5 checksum:    53696 3d064b2d08ccc6a8ae11e1771379f1c7
        Size/MD5 checksum:  5320607 750839c9c018a0984fd94f7a9cc3dd7f
    alpha architecture (DEC Alpha)
        Size/MD5 checksum:   273438 6a97ce0db5683e1b87c2a3debd4f0a2f
        Size/MD5 checksum:  3049536 4eaec5fabcab56b1fe06c2d6e0fa8574
        Size/MD5 checksum:   342354 6bb6d7334e986265f9a1f6f0d6778d98
        Size/MD5 checksum:  1207870 d84910b4354cdb1796dd3d5787cdcee8
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum:  3101238 6350cb985ded4fbc6fb4c65127f586da
        Size/MD5 checksum:   320840 7cc70e973254a99a76834a7febbadc67
        Size/MD5 checksum:  1071354 1fb1921a73e16bfd2a4dc6925bdb8a7e
        Size/MD5 checksum:   262634 799e5eb80cf076fe34c9643b8078bb43
    arm architecture (ARM)
        Size/MD5 checksum:   254618 0d553164d3d303e096efbac3ab2dcabe
        Size/MD5 checksum:   309000 edc68fa74a8b939293ca23f7aa3a6efd
        Size/MD5 checksum:  1011704 9b9e1459b833922e31510cefab0594c0
        Size/MD5 checksum:  2901632 4ad15a531cdf51ef146f3337148a71d2
    armel architecture (ARM EABI)
        Size/MD5 checksum:  2924760 f06d340c4aa9f4044d5a00df6617e624
        Size/MD5 checksum:  1017348 3f72c2cb4d1d39d0fed98acd9d4409c3
        Size/MD5 checksum:   308638 f81fb9ba70eb3e5b8f3117dba5c18a6b
        Size/MD5 checksum:   258562 2b0b270a34ce0bfa9b8d7589782a820d
    hppa architecture (HP PA RISC)
        Size/MD5 checksum:   262180 5bb31fdc16b4883f42f3d9a8db31b478
        Size/MD5 checksum:   347268 025014303d4e266c8b3e7260022624e7
        Size/MD5 checksum:  2946180 aff9d6ce1e1fefe47443116d9791eee7
        Size/MD5 checksum:  1169546 e439f85cb7d5755488283b48c25213bc
    i386 architecture (Intel ia32)
        Size/MD5 checksum:   303718 a9bdcd4d31a594c196f18b916adcf29c
        Size/MD5 checksum:   259032 77d7d235c8395b14c47033158ca99a12
        Size/MD5 checksum:  2915646 fdf2b28a0b482e9b5310a69e303162a9
        Size/MD5 checksum:   958778 233e968682a24b1f7b8259552d869cc9
    ia64 architecture (Intel ia64)
        Size/MD5 checksum:   272290 c833704551b7330ff002c7a486fd6326
        Size/MD5 checksum:   410084 393d05ececb2b56c3e9cf8667bee6e37
        Size/MD5 checksum:  1489784 30b154c46b4d3609a54f86bd2c9608d4
        Size/MD5 checksum:  2800250 411058093b4bcf9cc241c97283b706f4
    mips architecture (MIPS (Big Endian))
        Size/MD5 checksum:  1039604 93dce812de2605a1decf3a91cf1fdcb6
        Size/MD5 checksum:  3050894 433d8ac69c75486c3f4ef1a8e8b571fc
        Size/MD5 checksum:   262606 24bc492fd4fb188222ce9eeb1ff0c768
        Size/MD5 checksum:   319884 a9f8a2f8b13d1bbd64ca5be52fafcdec
    mipsel architecture (MIPS (Little Endian))
        Size/MD5 checksum:  1028620 5373a76615b1208a0bcf648e1ac4d74d
        Size/MD5 checksum:   317226 528869d14dd652a8ff77a8d0949060ed
        Size/MD5 checksum:   257912 d4f5d5704b0137797635350ee6dbd74d
        Size/MD5 checksum:  3001244 09ffd9355ea180446462c4762118c0ea
    powerpc architecture (PowerPC)
        Size/MD5 checksum:  2948604 3378206f900751ead42c264fb889ded9
        Size/MD5 checksum:   333556 11a62eebda4b15f09bc9923c0256d4b5
        Size/MD5 checksum:  1031552 66e7ef314e0003a4626be23fdf7843f6
        Size/MD5 checksum:   259498 af3924c5043f456484598d76d6a0ca1f
    s390 architecture (IBM S/390)
        Size/MD5 checksum:   263080 0675ec6c2daf678d558f529eb59c45e9
        Size/MD5 checksum:   346292 1e77acadf630955325ad21d802512b39
        Size/MD5 checksum:  3021080 a59b06101c7d226f6ca526164f92c5c7
        Size/MD5 checksum:  1178440 a383e9a1ba4a2a8e1d8662031f2b7b0f
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum:  2713414 9fb579cb2a9729a7daa00472e4886c94
        Size/MD5 checksum:   257226 32f907739b4b8712832ab3370616a6af
        Size/MD5 checksum:   997232 2803a67dba4eff8dff851f89a5363592
        Size/MD5 checksum:   317520 32e167507b034ffc02a5371f46c968ea
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":27.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20.69,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":51.72,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.