==========================================================================
Ubuntu Security Notice USN-3850-1
January 09, 2019
nss vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in NSS.
Software Description:
– nss: Network Security Service library
Details:
Keegan Ryan discovered that NSS incorrectly handled ECDSA key generation.
A local attacker could possibly use this issue to perform a cache-timing
attack and recover private ECDSA keys. (CVE-2018-0495)
It was discovered that NSS incorrectly handled certain v2-compatible
ClientHello messages. A remote attacker could possibly use this issue to
perform a replay attack. (CVE-2018-12384)
It was discovered that NSS incorrectly handled certain padding oracles. A
remote attacker could possibly use this issue to perform a variant of the
Bleichenbacher attack. (CVE-2018-12404)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.10:
libnss3 2:3.36.1-1ubuntu1.1
Ubuntu 18.04 LTS:
libnss3 2:3.35-2ubuntu2.1
Ubuntu 16.04 LTS:
libnss3 2:3.28.4-0ubuntu0.16.04.4
Ubuntu 14.04 LTS:
libnss3 2:3.28.4-0ubuntu0.14.04.4
After a standard system update you need to restart any applications that
use NSS, such as Evolution, to make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3850-1
CVE-2018-0495, CVE-2018-12384, CVE-2018-12404
Package Information:
https://launchpad.net/ubuntu/+source/nss/2:3.36.1-1ubuntu1.1
https://launchpad.net/ubuntu/+source/nss/2:3.35-2ubuntu2.1
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.16.04.4
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.14.04.4
—–BEGIN PGP SIGNATURE—–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=kiYz
—–END PGP SIGNATURE—–
—