USN-3163-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-3163-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3163-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3163-1
Related
Published
2017-01-04T16:32:54.569806Z
Modified
2017-01-04T16:32:54.569806Z
Summary
nss vulnerabilities
Details

It was discovered that NSS incorrectly handled certain invalid Diffie-Hellman keys. A remote attacker could possibly use this flaw to cause NSS to crash, resulting in a denial of service. This issue only applied to Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-5285)

Hubert Kario discovered that NSS incorrectly handled Diffie Hellman client key exchanges. A remote attacker could possibly use this flaw to perform a small subgroup confinement attack and recover private keys. This issue only applied to Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-8635)

Franziskus Kiefer discovered that NSS incorrectly mitigated certain timing side-channel attacks. A remote attacker could possibly use this flaw to recover private keys. (CVE-2016-9074)

This update refreshes the NSS package to version 3.26.2 which includes the latest CA certificate bundle.

References

Affected packages

Ubuntu:14.04:LTS / nss

Package

Name
nss
Purl
pkg:deb/ubuntu/nss@2:3.26.2-0ubuntu0.14.04.3?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:3.26.2-0ubuntu0.14.04.3

Affected versions

2:3.*

2:3.15.1-1ubuntu1
2:3.15.2-1
2:3.15.3-1
2:3.15.3.1-1
2:3.15.3.1-1.1
2:3.15.3.1-1.1ubuntu1
2:3.15.4-1ubuntu3
2:3.15.4-1ubuntu4
2:3.15.4-1ubuntu5
2:3.15.4-1ubuntu6
2:3.15.4-1ubuntu7
2:3.15.4-1ubuntu7.1
2:3.17-0ubuntu0.14.04.1
2:3.17.1-0ubuntu0.14.04.1
2:3.17.1-0ubuntu0.14.04.2
2:3.17.4-0ubuntu0.14.04.1
2:3.19.2-0ubuntu0.14.04.1
2:3.19.2.1-0ubuntu0.14.04.1
2:3.19.2.1-0ubuntu0.14.04.2
2:3.21-0ubuntu0.14.04.1
2:3.21-0ubuntu0.14.04.2
2:3.23-0ubuntu0.14.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "libnss3-nssdb": "2:3.26.2-0ubuntu0.14.04.3",
            "libnss3-1d": "2:3.26.2-0ubuntu0.14.04.3",
            "libnss3-dbgsym": "2:3.26.2-0ubuntu0.14.04.3",
            "libnss3": "2:3.26.2-0ubuntu0.14.04.3",
            "libnss3-dev": "2:3.26.2-0ubuntu0.14.04.3",
            "libnss3-dbg": "2:3.26.2-0ubuntu0.14.04.3",
            "libnss3-tools": "2:3.26.2-0ubuntu0.14.04.3",
            "libnss3-tools-dbgsym": "2:3.26.2-0ubuntu0.14.04.3"
        }
    ]
}

Ubuntu:16.04:LTS / nss

Package

Name
nss
Purl
pkg:deb/ubuntu/nss@2:3.26.2-0ubuntu0.16.04.2?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:3.26.2-0ubuntu0.16.04.2

Affected versions

2:3.*

2:3.19.2-1ubuntu1
2:3.19.2.1-0ubuntu1
2:3.21-1ubuntu2
2:3.21-1ubuntu3
2:3.21-1ubuntu4
2:3.23-0ubuntu0.16.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "libnss3-nssdb": "2:3.26.2-0ubuntu0.16.04.2",
            "libnss3-1d": "2:3.26.2-0ubuntu0.16.04.2",
            "libnss3-dbgsym": "2:3.26.2-0ubuntu0.16.04.2",
            "libnss3": "2:3.26.2-0ubuntu0.16.04.2",
            "libnss3-dev": "2:3.26.2-0ubuntu0.16.04.2",
            "libnss3-dbg": "2:3.26.2-0ubuntu0.16.04.2",
            "libnss3-tools": "2:3.26.2-0ubuntu0.16.04.2",
            "libnss3-tools-dbgsym": "2:3.26.2-0ubuntu0.16.04.2"
        }
    ]
}