Site icon 지락문화예술공작단

USN-3029-1: NSS vulnerability

USN-3029-1: NSS vulnerability

Ubuntu Security Notice USN-3029-1

11th July, 2016

nss vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

Summary

NSS could be made to crash or run programs if it processed specially
crafted network traffic.

Software description

Details

Tyson Smith and Jed Davis discovered that NSS incorrectly handled memory. A
remote attacker could use this issue to cause NSS to crash, resulting in a
denial of service, or possibly execute arbitrary code.

This update refreshes the NSS package to version 3.23 which includes
the latest CA certificate bundle. As a security improvement, this update
also modifies NSS behaviour to reject DH key sizes below 1024 bits,
preventing a possible downgrade attack.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.04 LTS:
libnss3

2:3.23-0ubuntu0.16.04.1
Ubuntu 15.10:
libnss3

2:3.23-0ubuntu0.15.10.1
Ubuntu 14.04 LTS:
libnss3

2:3.23-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
libnss3

2:3.23-0ubuntu0.12.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use NSS, such as Evolution and Chromium, to make all the necessary
changes.

References

CVE-2016-2834

Source: USN-3029-1: NSS vulnerability

Exit mobile version