USN-2866-1: Firefox vulnerability

08 January 2016

Firefox could be made to expose sensitive information over the network.

Releases

Packages

  • firefox - Mozilla Open Source web browser

Details

Karthikeyan Bhargavan and Gaetan Leurent discovered that NSS incorrectly
allowed MD5 to be used for TLS 1.2 connections. If a remote attacker were
able to perform a man-in-the-middle attack, this flaw could be exploited to
view sensitive information.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 15.10
Ubuntu 15.04
Ubuntu 14.04
Ubuntu 12.04

After a standard system update you need to restart Firefox to make
all the necessary changes.

References

Related notices

  • USN-2863-1: openssl, libssl1.0.0
  • USN-2864-1: nss, libnss3
  • USN-2865-1: libgnutls-openssl27, libgnutls-deb0-28, libgnutlsxx28, gnutls28, libgnutls26, gnutls26, libgnutlsxx27
  • USN-2884-1: openjdk-7-jre-zero, openjdk-7-jre-headless, icedtea-7-jre-jamvm, openjdk-7-jre, openjdk-7-jre-lib, openjdk-7
  • USN-2904-1: thunderbird