[Bug 1465014] Re: after update still vulnerable against LOGJAM
Haw Loeung
1465014 at bugs.launchpad.net
Sun Jun 21 10:07:10 UTC 2015
3.19.2 was just released[1] with:
"""
Notable Changes in NSS 3.19.2
Bug 1172128 - In NSS 3.19.1, the minimum key sizes that the freebl cryptographic implementation (part of the softoken cryptographic module used by default by NSS) was willing to generate or use was increased - for RSA keys, to 512 bits, and for DH keys, 1023 bits. This was done as part of a security fix for Bug 1138554 / CVE-2015-4000. Applications that requested or attempted to use keys smaller then the minimum size would fail. However, this change in behaviour unintentionally broke existing NSS applications that need to generate or use such keys, via APIs such as SECKEY_CreateRSAPrivateKey or SECKEY_CreateDHPrivateKey.
In NSS 3.19.2, this change in freebl behaviour has been reverted. The
fix for Bug 1138554 has been moved to libssl, and will now only affect
the minimum keystrengths used in SSL/TLS.
Note: Future versions of NSS may increase the minimum keysizes required by the freebl module. Consumers of NSS are strongly encouraged to migrate to stronger cryptographic strengths as soon as possible.
"""
[1]https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2_release_notes
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4000
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1465014
Title:
after update still vulnerable against LOGJAM
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/firefox/+bug/1465014/+subscriptions
More information about the Ubuntu-server-bugs
mailing list