Linux Security
Linux Security
Linux Security

Debian: DSA-2123-1: New NSS packages fix cryptographic weaknesses

Date 01 Nov 2010
Posted By LinuxSecurity Advisories
Several vulnerabilities have been discovered in Mozilla's Network Security Services (NSS) library. The Common Vulnerabilities and Exposures project identifies the following problems:
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-2123-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                           Florian Weimer
November 01, 2010           
- ------------------------------------------------------------------------

Package        : nss
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2010-3170 CVE-2010-3173

Several vulnerabilities have been discovered in Mozilla's Network
Security Services (NSS) library.  The Common Vulnerabilities and
Exposures project identifies the following problems:

	NSS recognizes a wildcard IP address in the subject's Common
	Name field of an X.509 certificate, which might allow
	man-in-the-middle attackers to spoof arbitrary SSL servers via
	a crafted certificate issued by a legitimate Certification

	NSS does not properly set the minimum key length for
	Diffie-Hellman Ephemeral (DHE) mode, which makes it easier for
	remote attackers to defeat cryptographic protection mechanisms
	via a brute-force attack.

For the stable distribution (lenny), these problems have been fixed in

For the unstable distribution (sid) and the upcoming stable
distribution (squeeze), these problems have been fixed in version

We recommend that you upgrade your NSS packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Source archives:
    Size/MD5 checksum:     1394 908a5e77c32e84069883a3cfb836eb24
    Size/MD5 checksum:    53696 3d064b2d08ccc6a8ae11e1771379f1c7
    Size/MD5 checksum:  5320607 750839c9c018a0984fd94f7a9cc3dd7f

alpha architecture (DEC Alpha)
    Size/MD5 checksum:   273438 6a97ce0db5683e1b87c2a3debd4f0a2f
    Size/MD5 checksum:  3049536 4eaec5fabcab56b1fe06c2d6e0fa8574
    Size/MD5 checksum:   342354 6bb6d7334e986265f9a1f6f0d6778d98
    Size/MD5 checksum:  1207870 d84910b4354cdb1796dd3d5787cdcee8

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:  3101238 6350cb985ded4fbc6fb4c65127f586da
    Size/MD5 checksum:   320840 7cc70e973254a99a76834a7febbadc67
    Size/MD5 checksum:  1071354 1fb1921a73e16bfd2a4dc6925bdb8a7e
    Size/MD5 checksum:   262634 799e5eb80cf076fe34c9643b8078bb43

arm architecture (ARM)
    Size/MD5 checksum:   254618 0d553164d3d303e096efbac3ab2dcabe
    Size/MD5 checksum:   309000 edc68fa74a8b939293ca23f7aa3a6efd
    Size/MD5 checksum:  1011704 9b9e1459b833922e31510cefab0594c0
    Size/MD5 checksum:  2901632 4ad15a531cdf51ef146f3337148a71d2

armel architecture (ARM EABI)
    Size/MD5 checksum:  2924760 f06d340c4aa9f4044d5a00df6617e624
    Size/MD5 checksum:  1017348 3f72c2cb4d1d39d0fed98acd9d4409c3
    Size/MD5 checksum:   308638 f81fb9ba70eb3e5b8f3117dba5c18a6b
    Size/MD5 checksum:   258562 2b0b270a34ce0bfa9b8d7589782a820d

hppa architecture (HP PA RISC)
    Size/MD5 checksum:   262180 5bb31fdc16b4883f42f3d9a8db31b478
    Size/MD5 checksum:   347268 025014303d4e266c8b3e7260022624e7
    Size/MD5 checksum:  2946180 aff9d6ce1e1fefe47443116d9791eee7
    Size/MD5 checksum:  1169546 e439f85cb7d5755488283b48c25213bc

i386 architecture (Intel ia32)
    Size/MD5 checksum:   303718 a9bdcd4d31a594c196f18b916adcf29c
    Size/MD5 checksum:   259032 77d7d235c8395b14c47033158ca99a12
    Size/MD5 checksum:  2915646 fdf2b28a0b482e9b5310a69e303162a9
    Size/MD5 checksum:   958778 233e968682a24b1f7b8259552d869cc9

ia64 architecture (Intel ia64)
    Size/MD5 checksum:   272290 c833704551b7330ff002c7a486fd6326
    Size/MD5 checksum:   410084 393d05ececb2b56c3e9cf8667bee6e37
    Size/MD5 checksum:  1489784 30b154c46b4d3609a54f86bd2c9608d4
    Size/MD5 checksum:  2800250 411058093b4bcf9cc241c97283b706f4

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:  1039604 93dce812de2605a1decf3a91cf1fdcb6
    Size/MD5 checksum:  3050894 433d8ac69c75486c3f4ef1a8e8b571fc
    Size/MD5 checksum:   262606 24bc492fd4fb188222ce9eeb1ff0c768
    Size/MD5 checksum:   319884 a9f8a2f8b13d1bbd64ca5be52fafcdec

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:  1028620 5373a76615b1208a0bcf648e1ac4d74d
    Size/MD5 checksum:   317226 528869d14dd652a8ff77a8d0949060ed
    Size/MD5 checksum:   257912 d4f5d5704b0137797635350ee6dbd74d
    Size/MD5 checksum:  3001244 09ffd9355ea180446462c4762118c0ea

powerpc architecture (PowerPC)
    Size/MD5 checksum:  2948604 3378206f900751ead42c264fb889ded9
    Size/MD5 checksum:   333556 11a62eebda4b15f09bc9923c0256d4b5
    Size/MD5 checksum:  1031552 66e7ef314e0003a4626be23fdf7843f6
    Size/MD5 checksum:   259498 af3924c5043f456484598d76d6a0ca1f

s390 architecture (IBM S/390)
    Size/MD5 checksum:   263080 0675ec6c2daf678d558f529eb59c45e9
    Size/MD5 checksum:   346292 1e77acadf630955325ad21d802512b39
    Size/MD5 checksum:  3021080 a59b06101c7d226f6ca526164f92c5c7
    Size/MD5 checksum:  1178440 a383e9a1ba4a2a8e1d8662031f2b7b0f

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:  2713414 9fb579cb2a9729a7daa00472e4886c94
    Size/MD5 checksum:   257226 32f907739b4b8712832ab3370616a6af
    Size/MD5 checksum:   997232 2803a67dba4eff8dff851f89a5363592
    Size/MD5 checksum:   317520 32e167507b034ffc02a5371f46c968ea

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
Package info: `apt-cache show ' and

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"52","type":"x","order":"1","pct":80,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"8","type":"x","order":"2","pct":12.31,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":7.69,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.