USN-2864-1: NSS vulnerability
07 January 2016
NSS could be made to expose sensitive information over the network.
- nss - Network Security Service library
Karthikeyan Bhargavan and Gaetan Leurent discovered that NSS incorrectly
allowed MD5 to be used for TLS 1.2 connections. If a remote attacker were
able to perform a man-in-the-middle attack, this flaw could be exploited to
view sensitive information.
The problem can be corrected by updating your system to the following package versions:
After a standard system update you need to restart any applications that
use NSS, such as Evolution and Chromium, to make all the necessary changes.
- USN-2863-1: libssl1.0.0, openssl
- USN-2865-1: gnutls28, libgnutls26, libgnutlsxx27, gnutls26, libgnutls-openssl27, libgnutls-deb0-28, libgnutlsxx28
- USN-2866-1: firefox
- USN-2884-1: openjdk-7-jre, openjdk-7-jre-headless, openjdk-7-jre-lib, openjdk-7-jre-zero, openjdk-7, icedtea-7-jre-jamvm
- USN-2904-1: thunderbird