Your submission was sent successfully! Close

USN-3850-1: NSS vulnerabilities

09 January 2019

Several security issues were fixed in NSS.

Releases

Packages

  • nss - Network Security Service library

Details

Keegan Ryan discovered that NSS incorrectly handled ECDSA key generation.
A local attacker could possibly use this issue to perform a cache-timing
attack and recover private ECDSA keys. (CVE-2018-0495)

It was discovered that NSS incorrectly handled certain v2-compatible
ClientHello messages. A remote attacker could possibly use this issue to
perform a replay attack. (CVE-2018-12384)

It was discovered that NSS incorrectly handled certain padding oracles. A
remote attacker could possibly use this issue to perform a variant of the
Bleichenbacher attack. (CVE-2018-12404)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10
Ubuntu 18.04
Ubuntu 16.04
Ubuntu 14.04

After a standard system update you need to restart any applications that
use NSS, such as Evolution, to make all the necessary changes.

Related notices

  • USN-3689-2: libgcrypt11
  • USN-3692-1: libcrypto1.1-udeb, libssl1.0.0-udeb, libssl1.0-dev, libssl-doc, libcrypto1.0.0-udeb, libssl-dev, libssl1.1, libssl1.1-udeb, libssl1.0.0, openssl, openssl1.0
  • USN-3692-2: libssl1.0.0, openssl
  • USN-3850-2: libnss3, nss
  • USN-3689-1: libgcrypt11-doc, libgcrypt20-doc, libgcrypt20-udeb, libgcrypt20-dev, libgcrypt20, libgcrypt11-dev, libgcrypt-mingw-w64-dev, libgcrypt11-udeb, libgcrypt11