Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in NSS
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in NSS
ID: USN-3270-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 16.10, Ubuntu 17.04
Datum: Do, 27. April 2017, 23:53
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
Applikationen: NSS

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6336929526479772883==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="Hike8GTH3pwhgp5O7H8Oueaa20PakMbgQ"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--Hike8GTH3pwhgp5O7H8Oueaa20PakMbgQ
Content-Type: multipart/mixed;
boundary="mVBi2QwAUCrdKVTPmL6Tn8sSXTVqLRFa0"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <672d9c2e-6075-5ffa-d626-c6c6c88ba4e1@canonical.com>
Subject: [USN-3270-1] NSS vulnerabilities

--mVBi2QwAUCrdKVTPmL6Tn8sSXTVqLRFa0
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3270-1
April 27, 2017

nss vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in NSS.

Software Description:
- nss: Network Security Service library

Details:

Karthik Bhargavan and Gaetan Leurent discovered that the DES and Triple DES
ciphers were vulnerable to birthday attacks. A remote attacker could
possibly use this flaw to obtain clear text data from long encrypted
sessions. This update causes NSS to limit use of the same symmetric key.
(CVE-2016-2183)

It was discovered that NSS incorrectly handled Base64 decoding. A remote
attacker could use this flaw to cause NSS to crash, resulting in a denial
of service, or possibly execute arbitrary code. (CVE-2017-5461)

This update refreshes the NSS package to version 3.28.4 which includes
the latest CA certificate bundle.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
libnss3 2:3.28.4-0ubuntu0.17.04.1

Ubuntu 16.10:
libnss3 2:3.28.4-0ubuntu0.16.10.1

Ubuntu 16.04 LTS:
libnss3 2:3.28.4-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
libnss3 2:3.28.4-0ubuntu0.14.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use NSS, such as Evolution and Chromium, to make all the necessary
changes.

References:
http://www.ubuntu.com/usn/usn-3270-1
CVE-2016-2183, CVE-2017-5461

Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.17.04.1
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.16.10.1
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.14.04.1



--mVBi2QwAUCrdKVTPmL6Tn8sSXTVqLRFa0--

--Hike8GTH3pwhgp5O7H8Oueaa20PakMbgQ
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=1hga
-----END PGP SIGNATURE-----

--Hike8GTH3pwhgp5O7H8Oueaa20PakMbgQ--


--===============6336929526479772883==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============6336929526479772883==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung