Franziskus Kiefer reported that the existing mitigations for
some timing side-channel attacks were insufficient:
<https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/#>[CVE-2016-9074](https://security-tracker.debian.org/tracker/CVE-2016-9074)
For Debian 7 Wheezy, these problems have been fixed in version
2:3.26-1+debu7u2.
We recommend that you upgrade your nss packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <https://wiki.debian.org/LTS>
CPE | Name | Operator | Version |
---|---|---|---|
nss | eq | 2:3.15.3.1-1.1 | |
nss | eq | 2:3.14.5-1+deb7u6 | |
nss | eq | 2:3.25-1 | |
nss | eq | 2:3.17.2-1 | |
nss | eq | 2:3.20.1-1 | |
nss | eq | 2:3.16.3-1.1 | |
nss | eq | 2:3.21-1.1 | |
nss | eq | 2:3.20-1 | |
nss | eq | 2:3.19.1-1 | |
nss | eq | 2:3.21-1 |