Users login

Create an account »


Users login

Home » Security Advisories» Ubuntu » NSS vulnerabilities

NSS vulnerabilities

  • Vendor: Ubuntu
  • Vendor ID: USN-3270-1
  • Date: April 27, 2017

Ubuntu Security Notice USN-3270-1
April 27, 2017

nss vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS


Several security issues were fixed in NSS.

Software Description:
- nss: Network Security Service library


Karthik Bhargavan and Gaetan Leurent discovered that the DES and Triple DES
ciphers were vulnerable to birthday attacks. A remote attacker could
possibly use this flaw to obtain clear text data from long encrypted
sessions. This update causes NSS to limit use of the same symmetric key.

It was discovered that NSS incorrectly handled Base64 decoding. A remote
attacker could use this flaw to cause NSS to crash, resulting in a denial
of service, or possibly execute arbitrary code. (CVE-2017-5461)

This update refreshes the NSS package to version 3.28.4 which includes
the latest CA certificate bundle.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
libnss3 2:3.28.4-0ubuntu0.17.04.1

Ubuntu 16.10:
libnss3 2:3.28.4-0ubuntu0.16.10.1

Ubuntu 16.04 LTS:
libnss3 2:3.28.4-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
libnss3 2:3.28.4-0ubuntu0.14.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use NSS, such as Evolution and Chromium, to make all the necessary

CVE-2016-2183, CVE-2017-5461

Package Information:

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <>

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »