Ubuntu 3029-1: NSS vulnerability

    Date11 Jul 2016
    Posted ByLinuxSecurity Advisories
    NSS could be made to crash or run programs if it processed specially crafted network traffic.
    Ubuntu Security Notice USN-3029-1
    July 11, 2016
    nss vulnerability
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 16.04 LTS
    - Ubuntu 15.10
    - Ubuntu 14.04 LTS
    - Ubuntu 12.04 LTS
    NSS could be made to crash or run programs if it processed specially
    crafted network traffic.
    Software Description:
    - nss: Network Security Service library
    Tyson Smith and Jed Davis discovered that NSS incorrectly handled memory. A
    remote attacker could use this issue to cause NSS to crash, resulting in a
    denial of service, or possibly execute arbitrary code.
    This update refreshes the NSS package to version 3.23 which includes
    the latest CA certificate bundle. As a security improvement, this update
    also modifies NSS behaviour to reject DH key sizes below 1024 bits,
    preventing a possible downgrade attack.
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 16.04 LTS:
      libnss3                         2:3.23-0ubuntu0.16.04.1
    Ubuntu 15.10:
      libnss3                         2:3.23-0ubuntu0.15.10.1
    Ubuntu 14.04 LTS:
      libnss3                         2:3.23-0ubuntu0.14.04.1
    Ubuntu 12.04 LTS:
      libnss3                         2:3.23-0ubuntu0.12.04.1
    This update uses a new upstream release, which includes additional bug
    fixes. After a standard system update you need to restart any applications
    that use NSS, such as Evolution and Chromium, to make all the necessary
    Package Information:
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"64","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.39,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.46,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.