UbuntuUpdates.org

Package "libnss3-dev"

Name: libnss3-dev

Description:

Development files for the Network Security Service libraries

Latest version: 2:3.28.4-0ubuntu0.16.04.14
Release: xenial (16.04)
Level: security
Repository: main
Head package: nss
Homepage: http://www.mozilla.org/projects/security/pki/nss/

Links


Download "libnss3-dev"


Other versions of "libnss3-dev" in Xenial

Repository Area Version
base main 2:3.21-1ubuntu4
updates main 2:3.28.4-0ubuntu0.16.04.14

Changelog

Version: 2:3.28.4-0ubuntu0.16.04.14 2020-08-27 17:06:35 UTC

  nss (2:3.28.4-0ubuntu0.16.04.14) xenial-security; urgency=medium

  * SECURITY UPDATE: Out-of-bounds read
    - debian/patches/CVE-2020-12403-2.patch: fix incorrect call to ChaChaPoly1305 by PKCS11
      in nss/lib/freebl/chacha20poly1305.c.
    - CVE-2020-12403

 -- <email address hidden> (Leonidas S. Barbosa) Fri, 21 Aug 2020 15:41:08 -0300

Source diff to previous version

Version: 2:3.28.4-0ubuntu0.16.04.13 2020-08-10 19:07:07 UTC

  nss (2:3.28.4-0ubuntu0.16.04.13) xenial-security; urgency=medium

  * SECURITY UPDATE: Side-channel attack
    - debian/patches/CVE-2020-12400-and-6829-*.patch: use constant-time
      P-384 and P-521 in nss/lib/freebl/ecl/ecl-priv.h, nss/lib/freebl/ecl/ecl.c,
      nss/lib/freebl/ecl/ecl_spec384r1.c, nss/lib/freebl/freebl_base.gypi,
      nss/lib/freebl/manifest.mn, nss/test/ec/ectest.sh.
    - CVE-2020-12400
    - CVE-2020-6829
  * SECURITY UPDATE: Timing attack mitigation bypass
    - debian/patches/CVE-2020-12401.patch: remove unnecessary scalar
      padding in nss/lib/freebl/ec.c.
    - CVE-2020-12401

 -- <email address hidden> (Leonidas S. Barbosa) Wed, 05 Aug 2020 16:20:52 -0300

Source diff to previous version
CVE-2020-12400 P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function
CVE-2020-6829 Side channel attack on ECDSA signature generation
CVE-2020-12401 ECDSA timing attack mitigation bypass

Version: 2:3.28.4-0ubuntu0.16.04.12 2020-07-06 20:06:23 UTC

  nss (2:3.28.4-0ubuntu0.16.04.12) xenial-security; urgency=medium

  * SECURITY UPDATE: Side channel vulnerabilities during RSA key generation
    - debian/patches/CVE-2020-12402.patch: use constant-time GCD and
      modular inversion in nss/lib/freebl/mpi/mpi.c,
      nss/lib/freebl/mpi/mpi.h, nss/lib/freebl/mpi/mplogic.c.
    - CVE-2020-12402

 -- Marc Deslauriers <email address hidden> Mon, 22 Jun 2020 13:36:54 -0400

Source diff to previous version
CVE-2020-12402 Side channel vulnerabilities during RSA key generation

Version: 2:3.28.4-0ubuntu0.16.04.11 2020-06-16 18:06:38 UTC

  nss (2:3.28.4-0ubuntu0.16.04.11) xenial-security; urgency=medium

  * SECURITY UPDATE: Timing attack during DSA key generation
    - debian/patches/CVE-2020-12399.patch: force a fixed length for DSA
      exponentiation in nss/lib/freebl/dsa.c.
    - CVE-2020-12399

 -- Marc Deslauriers <email address hidden> Thu, 11 Jun 2020 09:45:43 -0400

Source diff to previous version
CVE-2020-12399 Force a fixed length for DSA exponentiation

Version: 2:3.28.4-0ubuntu0.16.04.10 2020-01-08 19:07:02 UTC

  nss (2:3.28.4-0ubuntu0.16.04.10) xenial-security; urgency=medium

  * SECURITY UPDATE: Possible wrong length for cryptographic primitives input
    - debian/patches/CVE-2019-17006.patch: adds checks for length of crypto
      primitives in nss/lib/freebl/chacha20poly1305.c,
      nss/lib/freebl/ctr.c, nss/lib/freebl/gcm.c,
      nss/lib/freebl/intel-gcm-wrap.c,
      nss/lib/freebl/rsapkcs.c.
    - CVE-2019-17006

 -- <email address hidden> (Leonidas S. Barbosa) Tue, 07 Jan 2020 14:42:06 -0300

CVE-2019-17006 Check length of inputs for cryptographic primitives



About   -   Send Feedback to @ubuntu_updates