A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
{
"binaries": [
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm8",
"binary_name": "libnss3"
},
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm8",
"binary_name": "libnss3-1d"
},
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm8",
"binary_name": "libnss3-dev"
},
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm8",
"binary_name": "libnss3-nssdb"
},
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm8",
"binary_name": "libnss3-tools"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"binaries": [
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.14",
"binary_name": "libnss3"
},
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.14",
"binary_name": "libnss3-1d"
},
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.14",
"binary_name": "libnss3-dev"
},
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.14",
"binary_name": "libnss3-nssdb"
},
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.14",
"binary_name": "libnss3-tools"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "2:3.35-2ubuntu2.12",
"binary_name": "libnss3"
},
{
"binary_version": "2:3.35-2ubuntu2.12",
"binary_name": "libnss3-dev"
},
{
"binary_version": "2:3.35-2ubuntu2.12",
"binary_name": "libnss3-tools"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "2:3.49.1-1ubuntu1.5",
"binary_name": "libnss3"
},
{
"binary_version": "2:3.49.1-1ubuntu1.5",
"binary_name": "libnss3-dev"
},
{
"binary_version": "2:3.49.1-1ubuntu1.5",
"binary_name": "libnss3-tools"
}
],
"availability": "No subscription required"
}