drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in NSS
Name: |
Ausführen beliebiger Kommandos in NSS |
|
ID: |
USN-3029-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.10, Ubuntu 16.04 LTS |
|
Datum: |
Mo, 11. Juli 2016, 22:26 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834 |
|
Applikationen: |
NSS |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============8859322786818564849== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="4Xs0LujRMBSvfJ7E9KvMUvddSEFhfljOC"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --4Xs0LujRMBSvfJ7E9KvMUvddSEFhfljOC Content-Type: multipart/mixed; boundary="9aMpUTlKQgOJhFhnkoUH2kkS6R3jK7Tfr" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> Message-ID: <5783DFB4.50401@canonical.com> Subject: [USN-3029-1] NSS vulnerability
--9aMpUTlKQgOJhFhnkoUH2kkS6R3jK7Tfr Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3029-1 July 11, 2016
nss vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS - Ubuntu 15.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
NSS could be made to crash or run programs if it processed specially crafted network traffic.
Software Description: - nss: Network Security Service library
Details:
Tyson Smith and Jed Davis discovered that NSS incorrectly handled memory. A remote attacker could use this issue to cause NSS to crash, resulting in a denial of service, or possibly execute arbitrary code.
This update refreshes the NSS package to version 3.23 which includes the latest CA certificate bundle. As a security improvement, this update also modifies NSS behaviour to reject DH key sizes below 1024 bits, preventing a possible downgrade attack.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: libnss3 2:3.23-0ubuntu0.16.04.1
Ubuntu 15.10: libnss3 2:3.23-0ubuntu0.15.10.1
Ubuntu 14.04 LTS: libnss3 2:3.23-0ubuntu0.14.04.1
Ubuntu 12.04 LTS: libnss3 2:3.23-0ubuntu0.12.04.1
This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any applications that use NSS, such as Evolution and Chromium, to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-3029-1 CVE-2016-2834
Package Information: https://launchpad.net/ubuntu/+source/nss/2:3.23-0ubuntu0.16.04.1 https://launchpad.net/ubuntu/+source/nss/2:3.23-0ubuntu0.15.10.1 https://launchpad.net/ubuntu/+source/nss/2:3.23-0ubuntu0.14.04.1 https://launchpad.net/ubuntu/+source/nss/2:3.23-0ubuntu0.12.04.1
--9aMpUTlKQgOJhFhnkoUH2kkS6R3jK7Tfr--
--4Xs0LujRMBSvfJ7E9KvMUvddSEFhfljOC Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAEBCgAGBQJXg9+0AAoJEGVp2FWnRL6TKRUP/1wiNQzgxkxWU/UD3WtGv5cD Tzg2qmwyjhe4TvJN4n3T6ndJsh53Rj1FxzHq4W2C7+4EPE8PdvE3O70T3W9gq/SN dBHxVtBSWbAmyKndGmak+XKUz/nb1gx5tGHLYsM1l3VUhMEVxfC54m9uPoni7qcy 8xN3xbetxxczEVdQi7arD0fi3vddBd/hk+if7kY3aVN1IFAgaY4LptrKrpxbC2ss +bxMSb4XjxmhThcHiRilQbUQ/1CHsEOUO+V/dHIZXUePV5GkkrBd42Au0jAhr361 JYsKgawbEQiInzdi8XNmfmHfpEf/IDBg5pIM44mqcmgd39jsA1fdt6PneVyIwVdb Q1Z+YYQmAXnpBUG2UWp+A5wrr2YhYrVwHFplMPiZI7s4Uy+TidbVrjXcygRqH1D7 P0XVFg/i0+jBcnSDTnu8FBlTw87vD4Lqa7XdJO+r5QVcXDXvvZrfOoXXcB3//Zh2 tQCgrkPS6D4nG1jXRMkX3sCHAusrwLbN9suL83/eFC8gQkWFaSVHVxYgXtE3oW5c CfqemI1aK/9BaKBbVDGVDZmAQ+R3u2xUSzqsNDldNXydR+DDLJv8f8MjWi70msCl GhRKn7T7y26hjyITQHg3SIOlOIkDvcpgyuwkt5tG1OcdPpmZIc2bJWOYtcBdy3Ql eKTF2uX2o8AbU7VPqBOb =8WEc -----END PGP SIGNATURE-----
--4Xs0LujRMBSvfJ7E9KvMUvddSEFhfljOC--
--===============8859322786818564849== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============8859322786818564849==--
|
|
|
|