Descriptionnet/socket/ssl_client_socket_nss.cc in the TLS implementation in Google Chrome before 31.0.1650.48 does not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which might allow remote web servers to interfere with trust relationships by renegotiating a session.
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
|National Vulnerability Database|
- openSUSE-SU-2013:1776-1, published Wed, 27 Nov 2013 20:04:13 +0100 (CET)
- openSUSE-SU-2013:1777-1, published Wed, 27 Nov 2013 20:04:35 +0100 (CET)
- openSUSE-SU-2013:1861-1, published Thu, 12 Dec 2013 18:05:02 +0100 (CET)
- openSUSE-SU-2014:0065-1, published Wed, 15 Jan 2014 11:04:14 +0100 (CET)
List of released packages
|Product(s)||Fixed package version(s)||References|
|openSUSE Leap 15.0|| ||Patchnames: |
openSUSE Leap 15.0 GA chromium-66.0.3359.170-lp150.1.1
|openSUSE Tumbleweed|| ||Patchnames: |
openSUSE Tumbleweed GA chromedriver-55.0.2883.75-3.1