USN-3850-2: NSS vulnerabilities
18 February 2019
Several security issues were fixed in NSS.
Releases
Packages
- nss - Network Security Service library
Details
USN-3850-1 fixed several vulnerabilities in NSS. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
Keegan Ryan discovered that NSS incorrectly handled ECDSA key generation.
A local attacker could possibly use this issue to perform a cache-timing
attack and recover private ECDSA keys. (CVE-2018-0495)
It was discovered that NSS incorrectly handled certain v2-compatible
ClientHello messages. A remote attacker could possibly use this issue to
perform a replay attack. (CVE-2018-12384)
It was discovered that NSS incorrectly handled certain padding oracles. A
remote attacker could possibly use this issue to perform a variant of the
Bleichenbacher attack. (CVE-2018-12404)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
After a standard system update you need to restart any applications that
use NSS, such as Evolution, to make all the necessary changes.
References
Related notices
- USN-3692-1: libssl-dev, libssl1.0.0-udeb, libssl-doc, openssl, libcrypto1.0.0-udeb, openssl1.0, libssl1.1, libssl1.0-dev, libssl1.1-udeb, libssl1.0.0, libcrypto1.1-udeb
- USN-3692-2: openssl, libssl1.0.0
- USN-3689-2: libgcrypt11
- USN-3689-1: libgcrypt20-doc, libgcrypt11-doc, libgcrypt11-dev, libgcrypt20-dev, libgcrypt11-udeb, libgcrypt20, libgcrypt20-udeb, libgcrypt-mingw-w64-dev, libgcrypt11
- USN-3850-1: libnss3-nssdb, libnss3-dev, nss, libnss3-tools, libnss3-1d, libnss3