===========================================================
Ubuntu Security Notice USN-1106-1 April 06, 2011
nss vulnerabilities
https://launchpad.net/bugs/741729
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 8.04 LTS
Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 8.04 LTS:
libnss3-1d 3.12.9+ckbi-1.82-0ubuntu0.8.04.1
Ubuntu 9.10:
libnss3-1d 3.12.9+ckbi-1.82-0ubuntu0.9.10.1
Ubuntu 10.04 LTS:
libnss3-1d 3.12.9+ckbi-1.82-0ubuntu0.10.04.1
Ubuntu 10.10:
libnss3-1d 3.12.9+ckbi-1.82-0ubuntu0.10.10.1
After a standard system update you need to restart any applications that
use NSS, such as Thunderbird or Evolution, to make all the necessary
changes.
Details follow:
It was discovered that several invalid HTTPS certificates were issued and
revoked. An attacker could exploit these to perform a man in the middle
attack to view sensitive information or alter encrypted communications.
These certificates were marked as explicitly not trusted to prevent their
misuse.
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.9+ckbi-1.82-0ubuntu0.8.04.1.diff.gz
Size/MD5: 38160 26e5fa8be2dd46b9509b6ba4c14d9a41
http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.9+ckbi-1.82-0ubuntu0.8.04.1.dsc
Size/MD5: 1431 feaffe0aa70f65d08d8c53fe4488644a
http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.9+ckbi-1.82.orig.tar.gz
Size/MD5: 6013564 58419debd698638b4660d87eb995df91
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 19128 7835438a608760273498dc9c025b1f6b
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 3250536 b15290e124b2c5ad3ae84a36792602d8
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 1207114 d9b4facc2777c5a125416743314e68e8
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 265546 72c7edd8b7e95999c75b78f726f1fca2
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_amd64.deb
Size/MD5: 312970 2c8b3e17cd4ae994cebd31e884717f4b
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_i386.deb
Size/MD5: 19034 f923001ad66ac3729049aba3c6827d63
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_i386.deb
Size/MD5: 3095986 fa05a1f129134baecd7b8de9358ab1c7
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_i386.deb
Size/MD5: 1093834 890eb1d3b54a3a427245c7e4cc2ae9a5
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_i386.deb
Size/MD5: 262908 235d9c2cf8a860fda38f5f2cc96bb4ab
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_i386.deb
Size/MD5: 295252 4ac8424e4e242f0380620e69b598f34c
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 19022 574e05c6f3b9df360c7e2f1db6fa7b67
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 3130522 4986362b65eb97ca5b78ad241435ded2
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 1072310 0a146aed92e8f2adbf993c02985a3982
http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 261740 0fcd7826f1b508a336ec9546e98f37d1
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_lpia.deb
Size/MD5: 292912 bda78213ea3697534ed1d25f21a376ae
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 21494 09fe7f661019003de1e29fb39fe55be0
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 3212436 aa8a97c5c614d397b178fb1df09696bd
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 1202502 25fc900cc643800e24434a3b4d220d0b
http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 264538 4ee43fa1bb56038a557f558045094784
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_powerpc.deb
Size/MD5: 326282 a8e875ba7d469936ceac630cf9706b5a
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_sparc.deb
Size/MD5: 19122 5094405c0918b7f1108572543c1615c8
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_sparc.deb
Size/MD5: 2918668 9958c56cffb06f26dc2d998a315af778
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_sparc.deb
Size/MD5: 1074630 cbebc9ee8e720869cb5bab808d5c705e
http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_sparc.deb
Size/MD5: 260062 d851ab32c443409e67d077fa1421074e
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.8.04.1_sparc.deb
Size/MD5: 300778 93a5cb47a2e14b188830ccd7bbc2a12c
Updated packages for Ubuntu 9.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.9+ckbi-1.82-0ubuntu0.9.10.1.diff.gz
Size/MD5: 37983 5557210562e3968b80d14837cad43b09
http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.9+ckbi-1.82-0ubuntu0.9.10.1.dsc
Size/MD5: 1431 f699592d8fb10216053d60ced7aa0527
http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.9+ckbi-1.82.orig.tar.gz
Size/MD5: 6013564 58419debd698638b4660d87eb995df91
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_amd64.deb
Size/MD5: 3272970 f10aa5b300e800fac8716f448d5e1b27
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_amd64.deb
Size/MD5: 1258574 f125e5089df66313ea9968c248d34751
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_amd64.deb
Size/MD5: 266052 92d5e3e512c299a06297cd1b83684b4c
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_amd64.deb
Size/MD5: 18244 5b6b15ce5ce9d5d1c33732e4cece815d
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_amd64.deb
Size/MD5: 312992 490ba7dad2c9b3105297bd6b3aaa894e
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_i386.deb
Size/MD5: 3218852 b02470d9c90ac0390fb90f8911e69411
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_i386.deb
Size/MD5: 1144322 214c689a25d1d450a3daa789d486f8f5
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_i386.deb
Size/MD5: 263394 0323bd29e456919226d779c79960b0c9
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_i386.deb
Size/MD5: 18236 61a19cbff6c281f62fb7b2769f662c6b
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_i386.deb
Size/MD5: 299112 ea0bbae7997b40c133ca2e5b1dee014e
armel architecture (ARM Architecture):
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_armel.deb
Size/MD5: 3201002 52ad7be13472d785f7c4fae4c27bd208
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_armel.deb
Size/MD5: 1125624 7ea1797bf6074c079dc8a1f6f7736684
http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_armel.deb
Size/MD5: 265860 aa9527e3776bfe7163b16f61c1b13e49
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_armel.deb
Size/MD5: 18250 99757d9b6b8700a1ca7d62b8a2786c29
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_armel.deb
Size/MD5: 295292 c38b53749bde3f1d6a560c08d3a86f54
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_lpia.deb
Size/MD5: 3260120 6978f195450eb764fe824aeade0f9730
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_lpia.deb
Size/MD5: 1120508 fbbe2f6b43ece55aa135eb7320d8580a
http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_lpia.deb
Size/MD5: 262360 d54add562444c6a7790bf2f2ea13a186
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_lpia.deb
Size/MD5: 18236 1cbd94ee0c868b5324070ec7cdaf991a
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_lpia.deb
Size/MD5: 297544 10199da0f2ba7eaaf5226490848ab948
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_powerpc.deb
Size/MD5: 3364262 0f6fe59a8b366a825894640e91726f61
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_powerpc.deb
Size/MD5: 1229690 5967b23c17071002724464aab949a7b9
http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_powerpc.deb
Size/MD5: 264660 1e4a510980d6783edf5b561478c750b7
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_powerpc.deb
Size/MD5: 18236 9f26f1fd50dcccf267e091cbafc829d4
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_powerpc.deb
Size/MD5: 310066 2b7b2d094c43358f3e7002d34c432d7e
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_sparc.deb
Size/MD5: 2999856 4afce16c98e0dd28b4120dca8a6e0c43
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_sparc.deb
Size/MD5: 1096410 6cc85cfe54aa1e05e2cadbc9a23b0a76
http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_sparc.deb
Size/MD5: 260540 98e0914f67ace7a7b43b276f6d88ad9c
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_sparc.deb
Size/MD5: 18242 4d73604d5b087f9d4ecfb4ff01a8fc33
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.9.10.1_sparc.deb
Size/MD5: 299400 f01cf0866426e2644eb164debb3c869c
Updated packages for Ubuntu 10.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.9+ckbi-1.82-0ubuntu0.10.04.1.diff.gz
Size/MD5: 38055 dea20b8e851a879c6290b5466c937a48
http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.9+ckbi-1.82-0ubuntu0.10.04.1.dsc
Size/MD5: 1435 9e7036689bfcecd4a366be7af70fce6c
http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.9+ckbi-1.82.orig.tar.gz
Size/MD5: 6013564 58419debd698638b4660d87eb995df91
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_amd64.deb
Size/MD5: 3274494 c108cc7e80cee86f3fe708cf0e625f95
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_amd64.deb
Size/MD5: 1258500 b081ca382fcace882cfa7f7a87811265
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_amd64.deb
Size/MD5: 266078 24e6c44b3d60a96a54fae31be656678d
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_amd64.deb
Size/MD5: 18366 fcc18745d82bff6445cc4c27fcf502f0
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_amd64.deb
Size/MD5: 313202 d86dc7d39ea92bc4dcabcd41dab2017a
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_i386.deb
Size/MD5: 3217902 a535eec6a2be630a7a8a1855232af1dc
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_i386.deb
Size/MD5: 1144946 94ad91a01878dc5e4b72ae77b7c0a241
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_i386.deb
Size/MD5: 266966 503e44d18e075f9b6dea427785079717
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_i386.deb
Size/MD5: 18380 2d6087c960480213ad875081fdbae02e
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_i386.deb
Size/MD5: 298490 835b71e236996c9f694f8d9d7d9af98a
armel architecture (ARM Architecture):
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_armel.deb
Size/MD5: 3324502 909df1b9af55ae8658a188372fa2c154
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_armel.deb
Size/MD5: 1072542 452d9d62c3960f91499f9e9754b16070
http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_armel.deb
Size/MD5: 264574 804e62f3bc7325dc6a69b3760ea71230
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_armel.deb
Size/MD5: 18380 df5bd94df281827cbaa7563bfc7f9a50
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_armel.deb
Size/MD5: 289206 18346c06f6e61aeace3f7325bc43a692
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_powerpc.deb
Size/MD5: 3364664 cf525cf29c52a7cd3a4ed0de2ac586f2
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_powerpc.deb
Size/MD5: 1221510 e2d988c52bd008edb6ee64be9a183053
http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_powerpc.deb
Size/MD5: 264814 bf3f96a4e05e830c9cff24e0f02d4885
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_powerpc.deb
Size/MD5: 18368 33c6fe6b62251c2c8a70870394ee5f37
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_powerpc.deb
Size/MD5: 310244 d736a7f5076c5ec79c76eea6bae7dbb2
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_sparc.deb
Size/MD5: 3028292 75defea29c1663f13d4ba367ee8956d8
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_sparc.deb
Size/MD5: 1136438 423ab727f3246e3e1e6422edf7a6455b
http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_sparc.deb
Size/MD5: 261160 09a343bea327aad48bf3111d38f93e61
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_sparc.deb
Size/MD5: 18370 f01923e7a3856e5f386e51a3635db895
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.10.04.1_sparc.deb
Size/MD5: 305688 9744f756009cd4b732c25cd16148574f
Updated packages for Ubuntu 10.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.9+ckbi-1.82-0ubuntu0.10.10.1.diff.gz
Size/MD5: 38193 d741a486cafc332cc55b62f3d7d2f1e3
http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.9+ckbi-1.82-0ubuntu0.10.10.1.dsc
Size/MD5: 1435 afc20c3bb86a444db575857145c66d07
http://security.ubuntu.com/ubuntu/pool/main/n/nss/nss_3.12.9+ckbi-1.82.orig.tar.gz
Size/MD5: 6013564 58419debd698638b4660d87eb995df91
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_amd64.deb
Size/MD5: 3274982 0022a0db51b8c9d315851f342c259db9
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_amd64.deb
Size/MD5: 1253100 ec835d735db4d371fabfe12c9c382b10
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_amd64.deb
Size/MD5: 266180 de8073c7e0e061852ee1b343ce446140
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_amd64.deb
Size/MD5: 18446 97e570d8d1ed942143a5c34bc6b738d6
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_amd64.deb
Size/MD5: 310300 7dc52627f62664c819e8c23fc9685604
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_i386.deb
Size/MD5: 3217478 5ee5a883306bb37f0bd0fa6ebe887662
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_i386.deb
Size/MD5: 1138148 e0e80a5ac1d11182e66d0c10be0f71c8
http://security.ubuntu.com/ubuntu/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_i386.deb
Size/MD5: 263540 87d19074d8ce5ad821a93ad953f8125c
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_i386.deb
Size/MD5: 18448 8ae4d8201a7f927b28a30600db0a1561
http://security.ubuntu.com/ubuntu/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_i386.deb
Size/MD5: 296126 8e8b7dc7013c3b77f648349b019fa86c
armel architecture (ARM Architecture):
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_armel.deb
Size/MD5: 3299628 533ad71adc41ad833312fa91aeed3f97
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_armel.deb
Size/MD5: 1134058 a354ae78ca59f3d188a5581a15072729
http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_armel.deb
Size/MD5: 265974 5929cb8b6a03513244f16bdda5663736
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_armel.deb
Size/MD5: 18458 ce699284348433de50e5142b94b01798
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_armel.deb
Size/MD5: 301332 86856705e5eefbbb200fdfc1b3cb9c98
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d-dbg_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_powerpc.deb
Size/MD5: 3363324 30dbf2985d99e13e2f5504977f72da20
http://ports.ubuntu.com/pool/main/n/nss/libnss3-1d_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_powerpc.deb
Size/MD5: 1211628 6108995eb1754feb090cb27db51b8346
http://ports.ubuntu.com/pool/main/n/nss/libnss3-dev_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_powerpc.deb
Size/MD5: 264906 8b115b3cc243df21ae59f1441caae35c
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-0d_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_powerpc.deb
Size/MD5: 18452 7d9562cfd3cdd7ade1d69f68ac57f7f5
http://ports.ubuntu.com/pool/universe/n/nss/libnss3-tools_3.12.9+ckbi-1.82-0ubuntu0.10.10.1_powerpc.deb
Size/MD5: 306866 aa0796a7509c4e33ccf5fb70d3d7be11
--------------enig385930DFBE0190FDEA466C58
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAk2cnhMACgkQTniv4aqX/Vk/cACbBp9RjGL1T2mnqqEy/jcIq9GN
ktUAnRwai9vG4xgHchgII+wN//6afArF
=5Rfc
-----END PGP SIGNATURE-----
--------------enig385930DFBE0190FDEA466C58--
From - Wed Apr 6 20:10:50 2011
X-Account-Key: account7
X-UIDL: 4d7faa1e00014d8c
X-Mozilla-Status: 0000
X-Mozilla-Status2: 00000000
X-Mozilla-Keys:
Return-Path: <bugtraq-return-46529-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id 6B4C8ED1A9
for <lists@securityspace.com>; Wed, 6 Apr 2011 15:21:11 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 3E596143ACF; Wed, 6 Apr 2011 12:55:55 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 10876 invoked from network); 6 Apr 2011 17:28:42 -0000
Message-ID: <4D9CA2BC.3070608@apache.org>
Date: Wed, 06 Apr 2011 18:28:28 +0100
From: Mark Thomas <markt@apache.org>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.2; en-GB; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Tomcat Users List <users@tomcat.apache.org>
Cc: Tomcat Developers List <dev@tomcat.apache.org>,
Tomcat Announce List <announce@tomcat.apache.org>,
announce@apache.org, full-disclosure@lists.grok.org.uk,
bugtraq@securityfocus.com
Subject: [SECURITY] CVE-2011-1183 Apache Tomcat security constraint bypass
X-Enigmail-Version: 1.1.1
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Status: RO
CVE-2011-1183 Apache Tomcat security constraint bypass
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected:
- Tomcat 7.0.11
- Earlier versions are not affected
Description:
A regression in the fix for CVE-2011-1088 meant that security
constraints were ignored when no login configuration was present in the
web.xml and the web application was marked as meta-data complete.
Mitigation:
Users of affected versions should apply one of the following mitigations:
- Upgrade to a Tomcat 7.0.12 or later
- Ensure a login configuration is defined in web.xml
Credit:
This issue was identified by the Apache Tomcat security team.
References:
http://tomcat.apache.org/security.html
http://tomcat.apache.org/security-7.html
From - Wed Apr 6 20:10:50 2011
X-Account-Key: account7
X-UIDL: 4d7faa1e00014d8d
X-Mozilla-Status: 0000
X-Mozilla-Status2: 00000000
X-Mozilla-Keys:
Return-Path: <bugtraq-return-46531-lists=securityspace.com@securityfocus.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26])
by mx.securityspace.com (Postfix) with ESMTP id 1A6F3EC156
for <lists@securityspace.com>; Wed, 6 Apr 2011 15:27:57 -0400 (EDT)
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 7F47A143BB6; Wed, 6 Apr 2011 12:56:26 -0600 (MDT)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 13756 invoked from network); 6 Apr 2011 18:44:05 -0000
Subject: [USN-1107-1] x11-xserver-utils vulnerability
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Cc: bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="=-vcvL/YuM3Um/fqb3DOgj"
Date: Wed, 06 Apr 2011 14:43:58 -0400
Message-ID: <1302115438.4215.40.camel@mdlinux>
Mime-Version: 1.0
X-Mailer: Evolution 2.32.2
Status: RO
--=-vcvL/YuM3Um/fqb3DOgj
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
===========================================================
Ubuntu Security Notice USN-1107-1 April 06, 2011
x11-xserver-utils vulnerability
CVE-2011-0465
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 8.04 LTS
Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 8.04 LTS:
x11-xserver-utils 7.3+2ubuntu0.1
Ubuntu 9.10:
x11-xserver-utils 7.4+2ubuntu3.1
Ubuntu 10.04 LTS:
x11-xserver-utils 7.5+1ubuntu2.1
Ubuntu 10.10:
x11-xserver-utils 7.5+2ubuntu1.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
Details follow:
Sebastian Krahmer discovered that the xrdb utility incorrectly filtered
crafted hostnames. An attacker could use this flaw with a malicious
DHCP server or with a remote xdmcp login and execute arbitrary code,
resulting in root privilege escalation.
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.3+2ubuntu0.1.dsc
Size/MD5: 1855 ed72ba7905552c8ad970eb9b6ea65735
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.3+2ubuntu0.1.tar.gz
Size/MD5: 1993520 fbcfdc97544d06d5956b553f154024a9
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.3+2ubuntu0.1_amd64.deb
Size/MD5: 188578 55c51ac356a4c206986993426ef9c89a
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.3+2ubuntu0.1_i386.deb
Size/MD5: 173526 cff268921d0c6c4b0be4bd053c7a32ca
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.3+2ubuntu0.1_lpia.deb
Size/MD5: 174206 537c0ee33f027fe77b2d988a19addc98
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.3+2ubuntu0.1_powerpc.deb
Size/MD5: 223124 32704bc7de76ad266f152cd26a20799c
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.3+2ubuntu0.1_sparc.deb
Size/MD5: 178220 ef7a7a8d0342e3453b00ee574c7f6f8e
Updated packages for Ubuntu 9.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.4+2ubuntu3.1.dsc
Size/MD5: 2098 a8f51b5ddeb65b629fb7d3e37921bdb7
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.4+2ubuntu3.1.tar.gz
Size/MD5: 2027496 28363c3d291c9f299e40757abbd2ec11
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.4+2ubuntu3.1_amd64.deb
Size/MD5: 204686 4c3899eabc2a94b9e3885e61aa8b435d
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.4+2ubuntu3.1_i386.deb
Size/MD5: 187160 a4493402abed14adba7e186e33117d86
armel architecture (ARM Architecture):
http://ports.ubuntu.com/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.4+2ubuntu3.1_armel.deb
Size/MD5: 189234 4d203c561b9c8fe91b50099e8c87cc11
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.4+2ubuntu3.1_lpia.deb
Size/MD5: 185760 7acee417b2aee7c54ff7f3eed1301a9e
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.4+2ubuntu3.1_powerpc.deb
Size/MD5: 197428 4e7151586bc4139098c820c1d1b812a3
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.4+2ubuntu3.1_sparc.deb
Size/MD5: 196292 29e6bf5806bf8a492dbde60e48281fae
Updated packages for Ubuntu 10.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.5+1ubuntu2.1.dsc
Size/MD5: 2053 af668fc46b52cbbb8fce94579db91662
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.5+1ubuntu2.1.tar.gz
Size/MD5: 2017972 d68d1519793de89571ed5c78eae9dd1c
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.5+1ubuntu2.1_amd64.deb
Size/MD5: 185406 db3596b0abcd26fe8569687bf790d016
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.5+1ubuntu2.1_i386.deb
Size/MD5: 170078 7e6ea917d730b4b54bba69e4e3df533c
armel architecture (ARM Architecture):
http://ports.ubuntu.com/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.5+1ubuntu2.1_armel.deb
Size/MD5: 171114 a3281fd14dea567b7879ebe2c5782087
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.5+1ubuntu2.1_powerpc.deb
Size/MD5: 180332 eb5deb911bd3098f6969e4c758bc5a07
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.5+1ubuntu2.1_sparc.deb
Size/MD5: 182876 98a7170dd299c3d54b7d1b38f43e1058
Updated packages for Ubuntu 10.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.5+2ubuntu1.1.dsc
Size/MD5: 2050 89b42bbb00b6f26578c875da2b0fd26c
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.5+2ubuntu1.1.tar.gz
Size/MD5: 2114046 fd0986fe6eced94861a5b5d012ee5e0b
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.5+2ubuntu1.1_amd64.deb
Size/MD5: 185918 70308628801d2bca8c67d2941422e4fe
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.5+2ubuntu1.1_i386.deb
Size/MD5: 170444 3da72942a1f2351e1f2d9616402b3f9a
armel architecture (ARM Architecture):
http://ports.ubuntu.com/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.5+2ubuntu1.1_armel.deb
Size/MD5: 180638 dfef48402643a2c0d6d718db0023dcb7
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/x/x11-xserver-utils/x11-xserver-utils_7.5+2ubuntu1.1_powerpc.deb
Size/MD5: 180626 9e15d1f000b142344835c57179307227