drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in NSS
Name: |
Zwei Probleme in NSS |
|
ID: |
USN-2672-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 14.10, Ubuntu 15.04 |
|
Datum: |
Do, 9. Juli 2015, 21:04 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730 |
|
Applikationen: |
NSS |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0304850862904568411== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="c5sDMdRwqK1xNjXTcN5RmsDPocIU9Sl1r"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --c5sDMdRwqK1xNjXTcN5RmsDPocIU9Sl1r Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2672-1 July 09, 2015
nss vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04 - Ubuntu 14.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in NSS.
Software Description: - nss: Network Security Service library
Details:
Karthikeyan Bhargavan discovered that NSS incorrectly handled state transitions for the TLS state machine. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to skip the ServerKeyExchange message and remove the forward-secrecy property. (CVE-2015-2721)
Watson Ladd discovered that NSS incorrectly handled Elliptical Curve Cryptography (ECC) multiplication. A remote attacker could possibly use this issue to spoof ECDSA signatures. (CVE-2015-2730)
As a security improvement, this update modifies NSS behaviour to reject DH key sizes below 768 bits, preventing a possible downgrade attack.
This update also refreshes the NSS package to version 3.19.2 which includes the latest CA certificate bundle.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.04: libnss3 2:3.19.2-0ubuntu15.04.1
Ubuntu 14.10: libnss3 2:3.19.2-0ubuntu0.14.10.1
Ubuntu 14.04 LTS: libnss3 2:3.19.2-0ubuntu0.14.04.1
Ubuntu 12.04 LTS: libnss3 3.19.2-0ubuntu0.12.04.1
This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any applications that use NSS, such as Evolution and Chromium, to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2672-1 CVE-2015-2721, CVE-2015-2730
Package Information: https://launchpad.net/ubuntu/+source/nss/2:3.19.2-0ubuntu15.04.1 https://launchpad.net/ubuntu/+source/nss/2:3.19.2-0ubuntu0.14.10.1 https://launchpad.net/ubuntu/+source/nss/2:3.19.2-0ubuntu0.14.04.1 https://launchpad.net/ubuntu/+source/nss/3.19.2-0ubuntu0.12.04.1
--c5sDMdRwqK1xNjXTcN5RmsDPocIU9Sl1r Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJVnrJmAAoJEGVp2FWnRL6TSScQAIC6U35D6t6452pN43m2f+AX LnBzMUcl/q5sKidXC3nwfzQ9UQP9QmlD7THb6koWEtBd3uJpHH72r9To6LoMEQTd I0kWscwm622Pk50bHn5hE1e608AsFvEePHMRmLZO2s92k8JYpSiROoc9TbXuxhOT Q/ftrGVYNLL8G0ZSBM2XHItGHQGYhU5eJODkEYGTRL3uhxV/2SHy41au2COALW9I mRr7FzPtNpUenP2reIpW5CFPWU/A+1eIDZbPsqvia3bjnQiM2Xr1eP9c417PXs9I j9MCsqtYigIS0PHB2OlVQNJ+vWn3/yrEy3GM43wDGXIFa+xZ1nRWaxRWsLvDaIYd gIimf+zF+E8BmbYqaarbJaacJi98YEdeluco6eDuTIbxELeaTd8tCwdPUvO97tgg Q1BioZXNjhj24/Yfc1oWjk17WEnV0fLxQj3iYQEnbSM5WGkHv62kjvqi8QQEhFNX TToorTaBMouLu7d/IKaAuHytwo5RNy2s75h2myfln6PClW5Dvl+bgy+LF7D3R5t7 bhuCt+zQDIu9u+PkbMlen4wy9Ynt5nI8CzE8NxE/AP+S39KSWSdhhRkqBjP8eQyL RY9PDgNNIj6r5nGfInMwvFq+OLUWISJwBNSg7RloHYCil3DFHQZwMz9+DrzHM4R4 hRXcxKLBVUZml9hkVJyM =s7L2 -----END PGP SIGNATURE-----
--c5sDMdRwqK1xNjXTcN5RmsDPocIU9Sl1r--
--===============0304850862904568411== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0304850862904568411==--
|
|
|
|