UbuntuUpdates.org

Package "nss"

Name: nss

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Network Security Service libraries
  • Development files for the Network Security Service libraries

Latest version: 2:3.98-0ubuntu0.20.04.2
Release: focal (20.04)
Level: updates
Repository: main

Links



Other versions of "nss" in Focal

Repository Area Version
base universe 2:3.49.1-1ubuntu1
base main 2:3.49.1-1ubuntu1
security universe 2:3.98-0ubuntu0.20.04.2
security main 2:3.98-0ubuntu0.20.04.2
updates universe 2:3.98-0ubuntu0.20.04.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2:3.49.1-1ubuntu1.6 2021-12-01 20:07:09 UTC

  nss (2:3.49.1-1ubuntu1.6) focal-security; urgency=medium

  * SECURITY UPDATE: heap overflow when verifying DSA/RSA-PSS DER-encoded
    signatures
    - debian/patches/CVE-2021-43527.patch: check signature lengths in
      nss/lib/cryptohi/secvfy.c.
    - CVE-2021-43527

 -- Marc Deslauriers <email address hidden> Mon, 29 Nov 2021 07:15:58 -0500

Source diff to previous version
CVE-2021-43527 Heap overflow in NSS when verifying DSA/RSA-PSS DER-encoded signatures

Version: 2:3.49.1-1ubuntu1.5 2020-08-27 17:07:08 UTC

  nss (2:3.49.1-1ubuntu1.5) focal-security; urgency=medium

  * SECURITY UPDATE: Out-of-bounds read
    - debian/patches/CVE-2020-12403-*.patch: disable PKCS11 incremental
      mode for ChaCha20 and fix incorrect call to ChaChaPoly1305 by PKCS11
      in nss/gtests/pk11_gtest/pk11_cipherop_unittest.cc,
      nss/gtests/pk11_gtest/pk11_chacha20poly1305_unittest.cc,
      nss/lib/softoken/pkcs11c.c, nss/lib/freebl/chacha20poly1305.c.
    - CVE-2020-12403

 -- <email address hidden> (Leonidas S. Barbosa) Thu, 20 Aug 2020 12:02:04 -0300

Source diff to previous version

Version: 2:3.49.1-1ubuntu1.4 2020-08-10 19:07:16 UTC

  nss (2:3.49.1-1ubuntu1.4) focal-security; urgency=medium

  * SECURITY UPDATE: Side-channel attack
    - debian/patches/CVE-2020-12400-and-6829-*.patch: use constant-time
      P-384 and P-521 in nss/lib/freebl/ecl/ecl-priv.h, nss/lib/freebl/ecl/ecl.c,
      nss/lib/freebl/ecl/ecl_spec384r1.c, nss/lib/freebl/freebl_base.gypi,
      nss/lib/freebl/manifest.mn, nss/test/ec/ectest.sh.
    - CVE-2020-12400
    - CVE-2020-6829
  * SECURITY UPDATE: Timing attack mitigation bypass
    - debian/patches/CVE-2020-12401.patch: remove unnecessary scalar
      padding in nss/lib/freebl/ec.c.
    - CVE-2020-12401

 -- <email address hidden> (Leonidas S. Barbosa) Wed, 05 Aug 2020 15:28:48 -0300

Source diff to previous version
CVE-2020-12400 P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function
CVE-2020-6829 Side channel attack on ECDSA signature generation
CVE-2020-12401 ECDSA timing attack mitigation bypass

Version: 2:3.49.1-1ubuntu1.2 2020-07-06 21:06:29 UTC

  nss (2:3.49.1-1ubuntu1.2) focal-security; urgency=medium

  * SECURITY UPDATE: Side channel vulnerabilities during RSA key generation
    - debian/patches/CVE-2020-12402.patch: use constant-time GCD and
      modular inversion in nss/lib/freebl/mpi/mpi.c,
      nss/lib/freebl/mpi/mpi.h, nss/lib/freebl/mpi/mplogic.c.
    - CVE-2020-12402

 -- Marc Deslauriers <email address hidden> Mon, 22 Jun 2020 13:29:53 -0400

Source diff to previous version
CVE-2020-12402 Side channel vulnerabilities during RSA key generation

Version: 2:3.49.1-1ubuntu1.1 2020-06-16 18:06:57 UTC

  nss (2:3.49.1-1ubuntu1.1) focal-security; urgency=medium

  * SECURITY UPDATE: Timing attack during DSA key generation
    - debian/patches/CVE-2020-12399.patch: force a fixed length for DSA
      exponentiation in nss/lib/freebl/dsa.c.
    - CVE-2020-12399

 -- Marc Deslauriers <email address hidden> Wed, 10 Jun 2020 12:54:12 -0400

CVE-2020-12399 Force a fixed length for DSA exponentiation



About   -   Send Feedback to @ubuntu_updates