Upstream information

CVE-2013-6628 at MITRE

Description

net/socket/ssl_client_socket_nss.cc in the TLS implementation in Google Chrome before 31.0.1650.48 does not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which might allow remote web servers to interfere with trust relationships by renegotiating a session.

SUSE information

Overall state of this security issue: Running

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 850430 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 13.1
  • chromedriver >= 31.0.1650.63-13.7
  • chromedriver-debuginfo >= 31.0.1650.63-13.7
  • chromium >= 31.0.1650.63-13.7
  • chromium-debuginfo >= 31.0.1650.63-13.7
  • chromium-debugsource >= 31.0.1650.63-13.7
  • chromium-desktop-gnome >= 31.0.1650.63-13.7
  • chromium-desktop-kde >= 31.0.1650.63-13.7
  • chromium-ffmpegsumo >= 31.0.1650.63-13.7
  • chromium-ffmpegsumo-debuginfo >= 31.0.1650.63-13.7
  • chromium-suid-helper >= 31.0.1650.63-13.7
  • chromium-suid-helper-debuginfo >= 31.0.1650.63-13.7
Patchnames:
openSUSE-2013-961
openSUSE-2014-37
openSUSE Tumbleweed
  • chromedriver >= 55.0.2883.75-3.1
  • chromium >= 55.0.2883.75-3.1
Patchnames:
openSUSE Tumbleweed GA chromedriver