==========================================================================
Ubuntu Security Notice USN-3029-1
July 11, 2016
nss vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 16.04 LTS
– Ubuntu 15.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
NSS could be made to crash or run programs if it processed specially
crafted network traffic.
Software Description:
– nss: Network Security Service library
Details:
Tyson Smith and Jed Davis discovered that NSS incorrectly handled memory. A
remote attacker could use this issue to cause NSS to crash, resulting in a
denial of service, or possibly execute arbitrary code.
This update refreshes the NSS package to version 3.23 which includes
the latest CA certificate bundle. As a security improvement, this update
also modifies NSS behaviour to reject DH key sizes below 1024 bits,
preventing a possible downgrade attack.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
libnss3 2:3.23-0ubuntu0.16.04.1
Ubuntu 15.10:
libnss3 2:3.23-0ubuntu0.15.10.1
Ubuntu 14.04 LTS:
libnss3 2:3.23-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
libnss3 2:3.23-0ubuntu0.12.04.1
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use NSS, such as Evolution and Chromium, to make all the necessary
changes.
References:
http://www.ubuntu.com/usn/usn-3029-1
CVE-2016-2834
Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.23-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/nss/2:3.23-0ubuntu0.15.10.1
https://launchpad.net/ubuntu/+source/nss/2:3.23-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/nss/2:3.23-0ubuntu0.12.04.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQIcBAEBCgAGBQJXg9+0AAoJEGVp2FWnRL6TKRUP/1wiNQzgxkxWU/UD3WtGv5cD
Tzg2qmwyjhe4TvJN4n3T6ndJsh53Rj1FxzHq4W2C7+4EPE8PdvE3O70T3W9gq/SN
dBHxVtBSWbAmyKndGmak+XKUz/nb1gx5tGHLYsM1l3VUhMEVxfC54m9uPoni7qcy
8xN3xbetxxczEVdQi7arD0fi3vddBd/hk+if7kY3aVN1IFAgaY4LptrKrpxbC2ss
+bxMSb4XjxmhThcHiRilQbUQ/1CHsEOUO+V/dHIZXUePV5GkkrBd42Au0jAhr361
JYsKgawbEQiInzdi8XNmfmHfpEf/IDBg5pIM44mqcmgd39jsA1fdt6PneVyIwVdb
Q1Z+YYQmAXnpBUG2UWp+A5wrr2YhYrVwHFplMPiZI7s4Uy+TidbVrjXcygRqH1D7
P0XVFg/i0+jBcnSDTnu8FBlTw87vD4Lqa7XdJO+r5QVcXDXvvZrfOoXXcB3//Zh2
tQCgrkPS6D4nG1jXRMkX3sCHAusrwLbN9suL83/eFC8gQkWFaSVHVxYgXtE3oW5c
CfqemI1aK/9BaKBbVDGVDZmAQ+R3u2xUSzqsNDldNXydR+DDLJv8f8MjWi70msCl
GhRKn7T7y26hjyITQHg3SIOlOIkDvcpgyuwkt5tG1OcdPpmZIc2bJWOYtcBdy3Ql
eKTF2uX2o8AbU7VPqBOb
=8WEc
—–END PGP SIGNATURE—–
—