Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in NSS
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in NSS
ID: USN-3029-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.10, Ubuntu 16.04 LTS
Datum: Mo, 11. Juli 2016, 22:26
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============8859322786818564849==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="4Xs0LujRMBSvfJ7E9KvMUvddSEFhfljOC"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--4Xs0LujRMBSvfJ7E9KvMUvddSEFhfljOC
Content-Type: multipart/mixed;
boundary="9aMpUTlKQgOJhFhnkoUH2kkS6R3jK7Tfr"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <5783DFB4.50401@canonical.com>
Subject: [USN-3029-1] NSS vulnerability

--9aMpUTlKQgOJhFhnkoUH2kkS6R3jK7Tfr
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3029-1
July 11, 2016

nss vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

NSS could be made to crash or run programs if it processed specially
crafted network traffic.

Software Description:
- nss: Network Security Service library

Details:

Tyson Smith and Jed Davis discovered that NSS incorrectly handled memory. A
remote attacker could use this issue to cause NSS to crash, resulting in a
denial of service, or possibly execute arbitrary code.

This update refreshes the NSS package to version 3.23 which includes
the latest CA certificate bundle. As a security improvement, this update
also modifies NSS behaviour to reject DH key sizes below 1024 bits,
preventing a possible downgrade attack.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
libnss3 2:3.23-0ubuntu0.16.04.1

Ubuntu 15.10:
libnss3 2:3.23-0ubuntu0.15.10.1

Ubuntu 14.04 LTS:
libnss3 2:3.23-0ubuntu0.14.04.1

Ubuntu 12.04 LTS:
libnss3 2:3.23-0ubuntu0.12.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use NSS, such as Evolution and Chromium, to make all the necessary
changes.

References:
http://www.ubuntu.com/usn/usn-3029-1
CVE-2016-2834

Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.23-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/nss/2:3.23-0ubuntu0.15.10.1
https://launchpad.net/ubuntu/+source/nss/2:3.23-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/nss/2:3.23-0ubuntu0.12.04.1



--9aMpUTlKQgOJhFhnkoUH2kkS6R3jK7Tfr--

--4Xs0LujRMBSvfJ7E9KvMUvddSEFhfljOC
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=8WEc
-----END PGP SIGNATURE-----

--4Xs0LujRMBSvfJ7E9KvMUvddSEFhfljOC--


--===============8859322786818564849==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============8859322786818564849==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung