USN-2864-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-2864-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2864-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2864-1
Related
Published
2016-01-07T20:23:08.279633Z
Modified
2016-01-07T20:23:08.279633Z
Summary
nss vulnerability
Details

Karthikeyan Bhargavan and Gaetan Leurent discovered that NSS incorrectly allowed MD5 to be used for TLS 1.2 connections. If a remote attacker were able to perform a machine-in-the-middle attack, this flaw could be exploited to view sensitive information.

References

Affected packages

Ubuntu:14.04:LTS / nss

Package

Name
nss
Purl
pkg:deb/ubuntu/nss@2:3.19.2.1-0ubuntu0.14.04.2?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:3.19.2.1-0ubuntu0.14.04.2

Affected versions

2:3.*

2:3.15.1-1ubuntu1
2:3.15.2-1
2:3.15.3-1
2:3.15.3.1-1
2:3.15.3.1-1.1
2:3.15.3.1-1.1ubuntu1
2:3.15.4-1ubuntu3
2:3.15.4-1ubuntu4
2:3.15.4-1ubuntu5
2:3.15.4-1ubuntu6
2:3.15.4-1ubuntu7
2:3.15.4-1ubuntu7.1
2:3.17-0ubuntu0.14.04.1
2:3.17.1-0ubuntu0.14.04.1
2:3.17.1-0ubuntu0.14.04.2
2:3.17.4-0ubuntu0.14.04.1
2:3.19.2-0ubuntu0.14.04.1
2:3.19.2.1-0ubuntu0.14.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "libnss3-nssdb": "2:3.19.2.1-0ubuntu0.14.04.2",
            "libnss3-1d": "2:3.19.2.1-0ubuntu0.14.04.2",
            "libnss3-dbgsym": "2:3.19.2.1-0ubuntu0.14.04.2",
            "libnss3": "2:3.19.2.1-0ubuntu0.14.04.2",
            "libnss3-dev": "2:3.19.2.1-0ubuntu0.14.04.2",
            "libnss3-dbg": "2:3.19.2.1-0ubuntu0.14.04.2",
            "libnss3-tools": "2:3.19.2.1-0ubuntu0.14.04.2",
            "libnss3-tools-dbgsym": "2:3.19.2.1-0ubuntu0.14.04.2"
        }
    ]
}