CVE-2015-7575

Priority
Description
Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla
Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject
MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake
Protocol traffic, which makes it easier for man-in-the-middle attackers to
spoof servers by triggering a collision.
Notes
mdeslaurThis is called "SLOTH"
Package
Upstream:released (43.0.2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was released [43.0.4+build3-0ubuntu0.12.04.1])
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [43.0.4+build3-0ubuntu0.14.04.1])
Ubuntu 16.04 LTS (Xenial Xerus):released (43.0.4+build3-0ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver):released (43.0.4+build3-0ubuntu1)
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):released (2.12.14-5ubuntu3.11)
Ubuntu 14.04 ESM (Trusty Tahr):released (2.12.23-12ubuntu2.4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Patches:
Upstream:https://gitlab.com/gnutls/gnutls/commit/778b4825c4e9fbd087f6fd5e3c94e547b93ae10e
Package
Upstream:released (2.2.1-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.2.1-2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.2.1-2)
Package
Source: nss (LP Ubuntu Debian)
Upstream:released (2:3.21-1)
Ubuntu 12.04 ESM (Precise Pangolin):released (3.19.2.1-0ubuntu0.12.04.2)
Ubuntu 14.04 ESM (Trusty Tahr):released (2:3.19.2.1-0ubuntu0.14.04.2)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2:3.21-1ubuntu2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2:3.21-1ubuntu2)
Patches:
Upstream:https://hg.mozilla.org/projects/nss/rev/94e1157f3fbb (3.19.2)
Upstream:https://hg.mozilla.org/projects/nss/rev/891676aa0d85 (3.20)
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was released [6b38-1.13.10-0ubuntu0.12.04.1])
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [6b38-1.13.10-0ubuntu0.14.04.1])
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was released [7u95-2.6.4-0ubuntu0.12.04.1])
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [7u95-2.6.4-0ubuntu0.14.04.1])
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Package
Upstream:released (8u72-b15-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (8u72-b15-1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (8u72-b15-1)
Package
Upstream:released (1.0.1f)
Ubuntu 12.04 ESM (Precise Pangolin):released (1.0.1-4ubuntu5.33)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (1.0.1f-1ubuntu2.16)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (1.0.2e-1ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.0.2e-1ubuntu1)
Patches:
Upstream:https://git.openssl.org/?p=openssl.git;a=commit;h=45473632c54947859a731dfe2db087c002ef7aa7
Upstream:https://git.openssl.org/?p=openssl.git;a=commit;h=5e1ff664f95ab4c9176b3e86b5111e5777bad61a (1.0.1)
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was not-affected)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Package
Upstream:released (1.2.19,1.3.16)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Package
Priority: Low
Upstream:released (38.6.0)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was released [1:38.6.0+build1-0ubuntu0.12.04.1])
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [1:38.6.0+build1-0ubuntu0.14.04.1])
Ubuntu 16.04 LTS (Xenial Xerus):released (1:38.6.0+build1-0ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:38.6.0+build1-0ubuntu1)
More Information

Updated: 2020-09-10 04:54:45 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)