USN-2866-1: Firefox vulnerability

08 January 2016

Firefox could be made to expose sensitive information over the network.

Releases

Packages

  • firefox - Mozilla Open Source web browser

Details

Karthikeyan Bhargavan and Gaetan Leurent discovered that NSS incorrectly
allowed MD5 to be used for TLS 1.2 connections. If a remote attacker were
able to perform a man-in-the-middle attack, this flaw could be exploited to
view sensitive information.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 15.10
Ubuntu 15.04
Ubuntu 14.04
Ubuntu 12.04

After a standard system update you need to restart Firefox to make
all the necessary changes.

References

Related notices

  • USN-2863-1: libssl1.0.0, openssl
  • USN-2864-1: libnss3, nss
  • USN-2865-1: libgnutls-openssl27, libgnutls26, libgnutlsxx27, gnutls28, gnutls26, libgnutlsxx28, libgnutls-deb0-28
  • USN-2884-1: openjdk-7-jre-zero, openjdk-7, openjdk-7-jre, icedtea-7-jre-jamvm, openjdk-7-jre-lib, openjdk-7-jre-headless
  • USN-2904-1: thunderbird