[USN-3898-1] NSS vulnerability


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”HIwHLJtyoUnFE5PfpNtngIkFwiNpsrMEB”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–HIwHLJtyoUnFE5PfpNtngIkFwiNpsrMEB

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3898-1] NSS vulnerability

–2UOX4IdtLqRdM93HTP23w52qJWaWmKUzT

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3898-1
February 27, 2019

nss vulnerability
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

NSS could be made to crash if it received specially crafted network
traffic.

Software Description:
– nss: Network Security Service library

Details:

Hanno B=C3=B6ck and Damian Poddebniak discovered that NSS incorrectly han=
dled
certain CMS functions. A remote attacker could possibly use this issue to=

cause NSS to crash, resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
libnss3 2:3.36.1-1ubuntu1.2

Ubuntu 18.04 LTS:
libnss3 2:3.35-2ubuntu2.2

Ubuntu 16.04 LTS:
libnss3 2:3.28.4-0ubuntu0.16.04.5

Ubuntu 14.04 LTS:
libnss3 2:3.28.4-0ubuntu0.14.04.5

After a standard system update you need to restart any applications that
use NSS, such as Evolution, to make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3898-1
CVE-2018-18508

Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.36.1-1ubuntu1.2
https://launchpad.net/ubuntu/+source/nss/2:3.35-2ubuntu2.2
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.16.04.5
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.14.04.5

–2UOX4IdtLqRdM93HTP23w52qJWaWmKUzT–

–HIwHLJtyoUnFE5PfpNtngIkFwiNpsrMEB

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAlx20owACgkQZWnYVadE
vpPRpQ/7BNauB+tktWAo01dxR2xN3QbqoKibw6w5eFc+nN3ogsZe4XgDjJ5qkP6Q
8/AnjfT+OmDjxd0IfBhsbA17JjIlHvnDw2UZe5rS2Traxq8JFdgnBoMI4rLStXI8
/xKNOqcFcSbMKjwEt4fynUPweyDlwDTaejVS7uXrhhFx1exL0//yyMZAwmVCsYYC
JC/cwH0EIWp4tm5Bz8P2Rj7H9CZfYD6WKpjMOwkQF+gtRnZGq4kgt2CL4vgVxOx3
4DJDK7rAKsEY5LmKgobdQOFeqsFN/dz3NRxGGjW4F/TkcfWeH7OfGeRVUiRkubxs
KwU9i3KiAc7P+yHjnAUY1wylvh1sGi7nSITl823IOpDB+310AySzuZpTAduJL06c
y6uR3+PS7jxIOpMf8b5nIxN0MkuaxdRcEBVLEj+Lx8JhvlIr12Ke65StR6583PA5
GsjAb9KUpFL6oaHCs94lZOQKCQdfeJzekTVxYCeinCLwKGrQQVQ6fBTuD822PkUY
gdeeGaDhXo0DB0qoUSgPbBDPP3tlfHDaq3ptJHbJFS5sCClwThOY0JDJ6eI24m27
aTPsYjBmm7x1QjonL6EqK1a/q78MTUF4bFXWU4SZGasZPH5/zRtVniuBj77Y+jFw
zC9OJVeJl83JPtshNh4yIgas4Qzg0aV9z9pL+6zxHx32japi8z0=
=/QAS
—–END PGP SIGNATURE—–

–HIwHLJtyoUnFE5PfpNtngIkFwiNpsrMEB–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK