==========================================================================
Ubuntu Security Notice USN-3270-1
April 27, 2017
nss vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.04
– Ubuntu 16.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in NSS.
Software Description:
– nss: Network Security Service library
Details:
Karthik Bhargavan and Gaetan Leurent discovered that the DES and Triple DES
ciphers were vulnerable to birthday attacks. A remote attacker could
possibly use this flaw to obtain clear text data from long encrypted
sessions. This update causes NSS to limit use of the same symmetric key.
(CVE-2016-2183)
It was discovered that NSS incorrectly handled Base64 decoding. A remote
attacker could use this flaw to cause NSS to crash, resulting in a denial
of service, or possibly execute arbitrary code. (CVE-2017-5461)
This update refreshes the NSS package to version 3.28.4 which includes
the latest CA certificate bundle.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
libnss3 2:3.28.4-0ubuntu0.17.04.1
Ubuntu 16.10:
libnss3 2:3.28.4-0ubuntu0.16.10.1
Ubuntu 16.04 LTS:
libnss3 2:3.28.4-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
libnss3 2:3.28.4-0ubuntu0.14.04.1
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use NSS, such as Evolution and Chromium, to make all the necessary
changes.
References:
http://www.ubuntu.com/usn/usn-3270-1
CVE-2016-2183, CVE-2017-5461
Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.17.04.1
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.16.10.1
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.14.04.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQIcBAEBCgAGBQJZAiW4AAoJEGVp2FWnRL6TfqAQAJ4yCDv830ws/1MNH1FR+uzo
Ko76esYqh45kUC22PqxWFybX/5/ovRc8Ona0cpNojgWFy7Rz91neDfKtfKmn80oa
SSgVAKNySNGJlO+tIQlVxhViLEaWr+Ko0lKWOIAaUrbY3i+rUk1wnRsCQyBmAMqv
WHJZrjrCfoXtYrN71i4OaAqvMdcvIMc9+u/Lp4SKGDgBC4+bRxD6owr+GK1JAjoa
I0d1iYgWGBUvlPUffXAsTbqKBtv+UOaGeVPTJ0V7BjwXs1eghR9qD13h2rXe/tOj
cBlTc8rNNf6PFHJwXVXK8K2AuSoL+nakML++EgG0PO9LebHvzb9CD9BwF6QieVA4
OxgVXan254EfL+agFs0bhFcuZw/2tWa182NHS3c5qgUEworjiDQvppA6cBXoGSfA
xhezR9vmxZ3umxZL9EHdi9S1KeGhbnrPL7mVJJo9wpgrNlqeR1L6IYz9EroEJsot
QDVNFDvUsq82pYJcD5c1187T07hBL4i+Z7h7lKP+zQ6XX5MSMF6vVuQAWtk2+ugg
xxxi+Jgw2/KCk+s0QpBuU+M+IbDRBFHo67IJnmh0a0SiO8hJFCOCoabuMiNIoH6g
J8BZVeveQN3n4kV7q9GHE/G1wRosuC02e3w6rKShHhT8rUnYRzS7gtYV1rP/JVpY
A5H68ugbp4mTi4OD4/+a
=1hga
—–END PGP SIGNATURE—–
—