You are here
Home > Preporuke > Ranjivosti programskog paketa nss

Ranjivosti programskog paketa nss

  • Detalji os-a: LUB
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2672-1
July 09, 2015

nss vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.04
– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in NSS.

Software Description:
– nss: Network Security Service library

Details:

Karthikeyan Bhargavan discovered that NSS incorrectly handled state
transitions for the TLS state machine. If a remote attacker were able to
perform a man-in-the-middle attack, this flaw could be exploited to skip
the ServerKeyExchange message and remove the forward-secrecy property.
(CVE-2015-2721)

Watson Ladd discovered that NSS incorrectly handled Elliptical Curve
Cryptography (ECC) multiplication. A remote attacker could possibly use
this issue to spoof ECDSA signatures. (CVE-2015-2730)

As a security improvement, this update modifies NSS behaviour to reject DH
key sizes below 768 bits, preventing a possible downgrade attack.

This update also refreshes the NSS package to version 3.19.2 which includes
the latest CA certificate bundle.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
libnss3 2:3.19.2-0ubuntu15.04.1

Ubuntu 14.10:
libnss3 2:3.19.2-0ubuntu0.14.10.1

Ubuntu 14.04 LTS:
libnss3 2:3.19.2-0ubuntu0.14.04.1

Ubuntu 12.04 LTS:
libnss3 3.19.2-0ubuntu0.12.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use NSS, such as Evolution and Chromium, to make all the necessary
changes.

References:
http://www.ubuntu.com/usn/usn-2672-1
CVE-2015-2721, CVE-2015-2730

Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.19.2-0ubuntu15.04.1
https://launchpad.net/ubuntu/+source/nss/2:3.19.2-0ubuntu0.14.10.1
https://launchpad.net/ubuntu/+source/nss/2:3.19.2-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/nss/3.19.2-0ubuntu0.12.04.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=s7L2
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2015-07-0007-ADV
CveCVE-2015-2721 CVE-2015-2730
ID izvornikaUSN-2672-1
Proizvodnss
Izvorhttp://www.ubuntu.com
Top
More in Preporuke
Ranjivost programskog paketa openssl

Otkrivena je ranjivost u funkciji X509_verify_cert (crypto/x509/x509_vfy.c) u OpenSSL-u za FreeBSD. Ranjivost je uzrokovana nepravilnom obradom X.509 Basic Constraints cA...

Close