|
|
Subscribe / Log in / New account

Ubuntu alert USN-6727-1 (nss)

From:  Marc Deslauriers <marc.deslauriers@canonical.com>
To:  "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com>
Subject:  [USN-6727-1] NSS vulnerabilities
Date:  Wed, 10 Apr 2024 11:22:28 -0400
Message-ID:  <ef3592dc-f2eb-45a3-bffc-945e0eefbcee@canonical.com>

========================================================================== Ubuntu Security Notice USN-6727-1 April 10, 2024 nss vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in NSS. Software Description: - nss: Network Security Service library Details: It was discovered that NSS incorrectly handled padding when checking PKCS#1 certificates. A remote attacker could possibly use this issue to perform Bleichenbacher-like attacks and recover private data. This issue only affected Ubuntu 20.04 LTS. (CVE-2023-4421) It was discovered that NSS had a timing side-channel when performing RSA decryption. A remote attacker could possibly use this issue to recover private data. (CVE-2023-5388) It was discovered that NSS had a timing side-channel when using certain NIST curves. A remote attacker could possibly use this issue to recover private data. (CVE-2023-6135) The NSS package contained outdated CA certificates. This update refreshes the NSS package to version 3.98 which includes the latest CA certificate bundle and other security improvements. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 23.10: libnss3 2:3.98-0ubuntu0.23.10.1 Ubuntu 22.04 LTS: libnss3 2:3.98-0ubuntu0.22.04.1 Ubuntu 20.04 LTS: libnss3 2:3.98-0ubuntu0.20.04.1 This update uses a new upstream release, which includes additional bug fixes. In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6727-1 CVE-2023-4421, CVE-2023-5388, CVE-2023-6135 Package Information: https://launchpad.net/ubuntu/+source/nss/2:3.98-0ubuntu0.... https://launchpad.net/ubuntu/+source/nss/2:3.98-0ubuntu0.... https://launchpad.net/ubuntu/+source/nss/2:3.98-0ubuntu0....


Attachment: OpenPGP_signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmYWrrQACgkQZWnYVadE vpPFEw/9Et0IH3v1bCIv7yuXTaATQcrDiadoXiexEXsz1PuP5xmwQqpCZnAsTevr cJfLTsrQ17v8OXs8JnvCvBjsKo9Zm58pVoFnA25tfgT2uOtxSY7Nv0TBh5nd8/iW 9VwYJdcKqEnwfQpS44G2WaR8Rs9XBGc8bEm1ZzAjQzJcgKRfnEx8xP7+Sd25zRei 493I1eRinf8ECwZowKrO5MW9G0CC5vlk0bNnbAQmpFRrsO3rX+hmRDqMu690ll2q SVIVCUrXZyN9MZJaL19UdSrmKMhKISYNq4x0MBFEVomlQAMNteslKlxP3k8H6eDn V1+3RO1Z9UnoRuyKVURJb5uE6oIorDR1RDeqqHpXkExu05Wu3P9TjA/6KFk44DL/ QzlX3fOKXKPSUJEBA3tODuEa/UEsN2m6jP2+jjnMAlEPBwZDtf18J7fHgW/2WkLb 3MeOneUzdOWT5ncNp6QviZpEgOZ66OBBzqERyEqvTY7EEJLMDuq72if24EYO/rmD bSGni+JlrEUPTP75eCLix7vPJYCz2DuZmtkEkLoXvh+pCYQFo0xj26bTNywYvZzX lcKI2Mzr0Bpl1fX54zr1cOn6QLV56n1vToJ+ETh7NZQ96KUSUtRhsFprWuyJJNDa sSx6q5Zi3Tw1LocvuqEAgO4e1zaDSo1bZhMsNEg0Uq/zIEH3Seg= =8V5M -----END PGP SIGNATURE-----


Attachment: None (type=text/plain)


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds