==========================================================================
Ubuntu Security Notice USN-2159-1
April 02, 2014
nss vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 13.10
– Ubuntu 12.10
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS
Summary:
NSS could be made to expose sensitive information over the network.
Software Description:
– nss: Network Security Service library
Details:
It was discovered that NSS incorrectly handled wildcard certificates when
used with internationalized domain names. If a remote attacker were able to
perform a man-in-the-middle attack, this flaw could be exploited to spoof
SSL servers.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
libnss3 2:3.15.4-0ubuntu0.13.10.2
Ubuntu 12.10:
libnss3 3.15.4-0ubuntu0.12.10.2
Ubuntu 12.04 LTS:
libnss3 3.15.4-0ubuntu0.12.04.2
Ubuntu 10.04 LTS:
libnss3-1d 3.15.4-0ubuntu0.10.04.2
After a standard system update you need to restart any applications that
use NSS, such as Evolution and Chromium, to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2159-1
CVE-2014-1492
Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.15.4-0ubuntu0.13.10.2
https://launchpad.net/ubuntu/+source/nss/3.15.4-0ubuntu0.12.10.2
https://launchpad.net/ubuntu/+source/nss/3.15.4-0ubuntu0.12.04.2
https://launchpad.net/ubuntu/+source/nss/3.15.4-0ubuntu0.10.04.2
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/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=xfrj
—–END PGP SIGNATURE—–
—