Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in NSS
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in NSS
ID: USN-2672-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 14.10, Ubuntu 15.04
Datum: Do, 9. Juli 2015, 21:04
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
Applikationen: NSS

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============0304850862904568411==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="c5sDMdRwqK1xNjXTcN5RmsDPocIU9Sl1r"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--c5sDMdRwqK1xNjXTcN5RmsDPocIU9Sl1r
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2672-1
July 09, 2015

nss vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in NSS.

Software Description:
- nss: Network Security Service library

Details:

Karthikeyan Bhargavan discovered that NSS incorrectly handled state
transitions for the TLS state machine. If a remote attacker were able to
perform a man-in-the-middle attack, this flaw could be exploited to skip
the ServerKeyExchange message and remove the forward-secrecy property.
(CVE-2015-2721)

Watson Ladd discovered that NSS incorrectly handled Elliptical Curve
Cryptography (ECC) multiplication. A remote attacker could possibly use
this issue to spoof ECDSA signatures. (CVE-2015-2730)

As a security improvement, this update modifies NSS behaviour to reject DH
key sizes below 768 bits, preventing a possible downgrade attack.

This update also refreshes the NSS package to version 3.19.2 which includes
the latest CA certificate bundle.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
libnss3 2:3.19.2-0ubuntu15.04.1

Ubuntu 14.10:
libnss3 2:3.19.2-0ubuntu0.14.10.1

Ubuntu 14.04 LTS:
libnss3 2:3.19.2-0ubuntu0.14.04.1

Ubuntu 12.04 LTS:
libnss3 3.19.2-0ubuntu0.12.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use NSS, such as Evolution and Chromium, to make all the necessary
changes.

References:
http://www.ubuntu.com/usn/usn-2672-1
CVE-2015-2721, CVE-2015-2730

Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.19.2-0ubuntu15.04.1
https://launchpad.net/ubuntu/+source/nss/2:3.19.2-0ubuntu0.14.10.1
https://launchpad.net/ubuntu/+source/nss/2:3.19.2-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/nss/3.19.2-0ubuntu0.12.04.1



--c5sDMdRwqK1xNjXTcN5RmsDPocIU9Sl1r
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=s7L2
-----END PGP SIGNATURE-----

--c5sDMdRwqK1xNjXTcN5RmsDPocIU9Sl1r--


--===============0304850862904568411==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============0304850862904568411==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung