USN-2864-1: NSS vulnerability
07 January 2016
NSS could be made to expose sensitive information over the network.
- nss - Network Security Service library
Karthikeyan Bhargavan and Gaetan Leurent discovered that NSS incorrectly
allowed MD5 to be used for TLS 1.2 connections. If a remote attacker were
able to perform a man-in-the-middle attack, this flaw could be exploited to
view sensitive information.
The problem can be corrected by updating your system to the following package versions:
After a standard system update you need to restart any applications that
use NSS, such as Evolution and Chromium, to make all the necessary changes.
- USN-2863-1: openssl, libssl1.0.0
- USN-2865-1: libgnutls-openssl27, libgnutlsxx28, gnutls28, libgnutlsxx27, gnutls26, libgnutls-deb0-28, libgnutls26
- USN-2866-1: firefox
- USN-2884-1: openjdk-7-jre, openjdk-7-jre-lib, openjdk-7, openjdk-7-jre-zero, icedtea-7-jre-jamvm, openjdk-7-jre-headless
- USN-2904-1: thunderbird