You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa nss

Sigurnosni nedostatak programskog paketa nss

==========================================================================
Ubuntu Security Notice USN-4203-2
November 27, 2019

nss vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM

Summary:

NSS could be made to crash or run programs if it received specially crafted
input.

Software Description:
– nss: Network Security Service library

Details:

USN-4203-1 fixed a vulnerability in NSS. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that NSS incorrectly handled certain memory operations. A
remote attacker could use this issue to cause NSS to crash, resulting in a
denial of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
libnss3 2:3.28.4-0ubuntu0.14.04.5+esm2

Ubuntu 12.04 ESM:
libnss3 2:3.28.4-0ubuntu0.12.04.5

After a standard system update you need to restart any applications that
use NSS, such as Evolution, to make all the necessary changes.

References:
https://usn.ubuntu.com/4203-2
https://usn.ubuntu.com/4203-1
CVE-2019-11745
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=xjtW
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4203-1
November 27, 2019

nss vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.10
– Ubuntu 19.04
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

NSS could be made to crash or run programs if it received specially crafted
input.

Software Description:
– nss: Network Security Service library

Details:

It was discovered that NSS incorrectly handled certain memory operations. A
remote attacker could use this issue to cause NSS to crash, resulting in a
denial of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
libnss3 2:3.45-1ubuntu2.1

Ubuntu 19.04:
libnss3 2:3.42-1ubuntu2.3

Ubuntu 18.04 LTS:
libnss3 2:3.35-2ubuntu2.5

Ubuntu 16.04 LTS:
libnss3 2:3.28.4-0ubuntu0.16.04.8

After a standard system update you need to restart any applications that
use NSS, such as Evolution, to make all the necessary changes.

References:
https://usn.ubuntu.com/4203-1
CVE-2019-11745

Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.45-1ubuntu2.1
https://launchpad.net/ubuntu/+source/nss/2:3.42-1ubuntu2.3
https://launchpad.net/ubuntu/+source/nss/2:3.35-2ubuntu2.5
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.16.04.8

—–BEGIN PGP SIGNATURE—–
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=E5DR
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa cups

Otkriveni su sigurnosni nedostaci u programskom paketu cups za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju izazivanje DoS...

Close