USN-2864-1: NSS vulnerability

07 January 2016

NSS could be made to expose sensitive information over the network.

Releases

Packages

  • nss - Network Security Service library

Details

Karthikeyan Bhargavan and Gaetan Leurent discovered that NSS incorrectly
allowed MD5 to be used for TLS 1.2 connections. If a remote attacker were
able to perform a man-in-the-middle attack, this flaw could be exploited to
view sensitive information.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 15.10
Ubuntu 15.04
Ubuntu 14.04
Ubuntu 12.04

After a standard system update you need to restart any applications that
use NSS, such as Evolution and Chromium, to make all the necessary changes.

References

Related notices

  • USN-2863-1: openssl, libssl1.0.0
  • USN-2865-1: libgnutls26, libgnutlsxx28, libgnutlsxx27, gnutls26, libgnutls-openssl27, libgnutls-deb0-28, gnutls28
  • USN-2866-1: firefox
  • USN-2884-1: openjdk-7-jre-lib, openjdk-7-jre-headless, openjdk-7-jre-zero, icedtea-7-jre-jamvm, openjdk-7-jre, openjdk-7
  • USN-2904-1: thunderbird