[USN-3850-1] NSS vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”eFRpzPihwTdBOBVu20zvV9T3O2xcPKCSl”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–eFRpzPihwTdBOBVu20zvV9T3O2xcPKCSl

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3850-1] NSS vulnerabilities

–T45DNn7u3kogaNX8KFRpWDJKbYFVYQ7PY

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3850-1
January 09, 2019

nss vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in NSS.

Software Description:
– nss: Network Security Service library

Details:

Keegan Ryan discovered that NSS incorrectly handled ECDSA key generation.=

A local attacker could possibly use this issue to perform a cache-timing
attack and recover private ECDSA keys. (CVE-2018-0495)

It was discovered that NSS incorrectly handled certain v2-compatible
ClientHello messages. A remote attacker could possibly use this issue to
perform a replay attack. (CVE-2018-12384)

It was discovered that NSS incorrectly handled certain padding oracles. A=

remote attacker could possibly use this issue to perform a variant of the=

Bleichenbacher attack. (CVE-2018-12404)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
libnss3 2:3.36.1-1ubuntu1.1

Ubuntu 18.04 LTS:
libnss3 2:3.35-2ubuntu2.1

Ubuntu 16.04 LTS:
libnss3 2:3.28.4-0ubuntu0.16.04.4

Ubuntu 14.04 LTS:
libnss3 2:3.28.4-0ubuntu0.14.04.4

After a standard system update you need to restart any applications that
use NSS, such as Evolution, to make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3850-1
CVE-2018-0495, CVE-2018-12384, CVE-2018-12404

Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.36.1-1ubuntu1.1
https://launchpad.net/ubuntu/+source/nss/2:3.35-2ubuntu2.1
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.16.04.4
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.14.04.4

–T45DNn7u3kogaNX8KFRpWDJKbYFVYQ7PY–

–eFRpzPihwTdBOBVu20zvV9T3O2xcPKCSl

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=kiYz
—–END PGP SIGNATURE—–

–eFRpzPihwTdBOBVu20zvV9T3O2xcPKCSl–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK