ALAS-2014-429


Amazon Linux AMI Security Advisory: ALAS-2014-429
Advisory Release Date: 2014-10-16 22:21 Pacific
Severity: Important
References: CVE-2014-3566 

Issue Overview:

A flaw was found in the way SSL 3.0 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections.


Affected Packages:

nss


Issue Correction:
Run yum update nss to update your system.

New Packages:
i686:
    nss-3.16.2-7.57.amzn1.i686
    nss-sysinit-3.16.2-7.57.amzn1.i686
    nss-devel-3.16.2-7.57.amzn1.i686
    nss-tools-3.16.2-7.57.amzn1.i686
    nss-debuginfo-3.16.2-7.57.amzn1.i686
    nss-pkcs11-devel-3.16.2-7.57.amzn1.i686

src:
    nss-3.16.2-7.57.amzn1.src

x86_64:
    nss-3.16.2-7.57.amzn1.x86_64
    nss-tools-3.16.2-7.57.amzn1.x86_64
    nss-debuginfo-3.16.2-7.57.amzn1.x86_64
    nss-devel-3.16.2-7.57.amzn1.x86_64
    nss-pkcs11-devel-3.16.2-7.57.amzn1.x86_64
    nss-sysinit-3.16.2-7.57.amzn1.x86_64