You are here
Home > Preporuke > Ranjivost programskog paketa nss

Ranjivost programskog paketa nss

  • Detalji os-a: LUB
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2903-1
February 17, 2016

nss vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

NSS could be made to expose sensitive information.

Software Description:
– nss: Network Security Service library

Details:

Hanno Böck discovered that NSS incorrectly handled certain division
functions, possibly leading to cryptographic weaknesses. (CVE-2015-1938)

This update also refreshes the NSS package to version 3.21 which includes
the latest CA certificate bundle, and removes the SPI CA.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
libnss3 2:3.21-0ubuntu0.15.10.1

Ubuntu 14.04 LTS:
libnss3 2:3.21-0ubuntu0.14.04.1

Ubuntu 12.04 LTS:
libnss3 2:3.21-0ubuntu0.12.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use NSS, such as Evolution and Chromium, to make all the necessary
changes.

References:
http://www.ubuntu.com/usn/usn-2903-1
CVE-2016-1938

Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.21-0ubuntu0.15.10.1
https://launchpad.net/ubuntu/+source/nss/2:3.21-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/nss/2:3.21-0ubuntu0.12.04.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=7aF+
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2016-02-0029-ADV
CveCVE-2015-1938 CVE-2016-1938
ID izvornikaUSN-2903-1
Proizvodnss
Izvorhttp://www.ubuntu.com
Top
More in Preporuke
Ranjivost komponente IPFilter

Otkrivena je ranjivost u komponenti IPFilter na operacijskom sustavu HP-UX. Ranjivost udaljenim napadačima omogućuje provođenje DoS napada slanjem UDP paketa....

Close