MGASA-2014-0391

Source
https://advisories.mageia.org/MGASA-2014-0391.html
Import Source
https://advisories.mageia.org/MGASA-2014-0391.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0391
Related
Published
2014-09-26T15:55:04Z
Modified
2014-09-26T15:43:42Z
Summary
Updated nss packages fix CVE-2014-1568
Details

Updated nss packages fix security vulnerability:

Antoine Delignat-Lavaud, security researcher at Inria Paris in team Prosecco, reported an issue in Network Security Services (NSS) libraries affecting all versions. He discovered that NSS is vulnerable to a variant of a signature forgery attack previously published by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values involved in a signature and could lead to the forging of RSA certificates (CVE-2014-1568).

References
Credits

Affected packages

Mageia:4 / nss

Package

Name
nss
Purl
pkg:rpm/mageia/nss?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.17.1-1.1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / nss

Package

Name
nss
Purl
pkg:rpm/mageia/nss?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.17.1-1.mga3

Ecosystem specific

{
    "section": "core"
}