-
nss (2:3.28.4-0ubuntu0.16.04.14) xenial-security; urgency=medium
* SECURITY UPDATE: Out-of-bounds read
- debian/patches/CVE-2020-12403-2.patch: fix incorrect call to ChaChaPoly1305 by PKCS11
in nss/lib/freebl/chacha20poly1305.c.
- CVE-2020-12403
-- <email address hidden> (Leonidas S. Barbosa) Fri, 21 Aug 2020 15:41:08 -0300
-
nss (2:3.28.4-0ubuntu0.16.04.13) xenial-security; urgency=medium
* SECURITY UPDATE: Side-channel attack
- debian/patches/CVE-2020-12400-and-6829-*.patch: use constant-time
P-384 and P-521 in nss/lib/freebl/ecl/ecl-priv.h, nss/lib/freebl/ecl/ecl.c,
nss/lib/freebl/ecl/ecl_spec384r1.c, nss/lib/freebl/freebl_base.gypi,
nss/lib/freebl/manifest.mn, nss/test/ec/ectest.sh.
- CVE-2020-12400
- CVE-2020-6829
* SECURITY UPDATE: Timing attack mitigation bypass
- debian/patches/CVE-2020-12401.patch: remove unnecessary scalar
padding in nss/lib/freebl/ec.c.
- CVE-2020-12401
-- <email address hidden> (Leonidas S. Barbosa) Wed, 05 Aug 2020 16:20:52 -0300
-
nss (2:3.28.4-0ubuntu0.16.04.12) xenial-security; urgency=medium
* SECURITY UPDATE: Side channel vulnerabilities during RSA key generation
- debian/patches/CVE-2020-12402.patch: use constant-time GCD and
modular inversion in nss/lib/freebl/mpi/mpi.c,
nss/lib/freebl/mpi/mpi.h, nss/lib/freebl/mpi/mplogic.c.
- CVE-2020-12402
-- Marc Deslauriers <email address hidden> Mon, 22 Jun 2020 13:36:54 -0400
-
nss (2:3.28.4-0ubuntu0.16.04.11) xenial-security; urgency=medium
* SECURITY UPDATE: Timing attack during DSA key generation
- debian/patches/CVE-2020-12399.patch: force a fixed length for DSA
exponentiation in nss/lib/freebl/dsa.c.
- CVE-2020-12399
-- Marc Deslauriers <email address hidden> Thu, 11 Jun 2020 09:45:43 -0400
-
nss (2:3.28.4-0ubuntu0.16.04.10) xenial-security; urgency=medium
* SECURITY UPDATE: Possible wrong length for cryptographic primitives input
- debian/patches/CVE-2019-17006.patch: adds checks for length of crypto
primitives in nss/lib/freebl/chacha20poly1305.c,
nss/lib/freebl/ctr.c, nss/lib/freebl/gcm.c,
nss/lib/freebl/intel-gcm-wrap.c,
nss/lib/freebl/rsapkcs.c.
- CVE-2019-17006
-- <email address hidden> (Leonidas S. Barbosa) Tue, 07 Jan 2020 14:42:06 -0300
-
nss (2:3.28.4-0ubuntu0.16.04.9) xenial-security; urgency=medium
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2019-17007.patch: check got some certs in
collect_certs r=jcj in nss/lib/pkcs7/certread.c.
- CVE-2019-17007
-- <email address hidden> (Leonidas S. Barbosa) Thu, 05 Dec 2019 13:25:47 -0300
-
nss (2:3.28.4-0ubuntu0.16.04.8) xenial-security; urgency=medium
* SECURITY UPDATE: out-of-bounds write in NSC_EncryptUpdate
- debian/patches/CVE-2019-11745.patch: use maxout not block size in
nss/lib/softoken/pkcs11c.c.
- CVE-2019-11745
* Note: this does _not_ contain the changes from
2:3.28.4-0ubuntu0.16.04.7 in xenial-proposed.
-- Marc Deslauriers <email address hidden> Tue, 26 Nov 2019 08:53:56 -0500
-
nss (2:3.28.4-0ubuntu0.16.04.7) xenial; urgency=medium
* disable reading fips_enabled flag and enabling FIPS mode
automatically on a FIPS machine. libnss is not a FIPS
certified library. (LP: #1837734)
-- Vineetha Kamath <email address hidden> Tue, 23 Jul 2019 11:38:29 -0400
-
nss (2:3.28.4-0ubuntu0.16.04.6) xenial-security; urgency=medium
* SECURITY UPDATE: OOB read when importing a curve25519 private key
- debian/patches/CVE-2019-11719.patch: don't unnecessarily strip
leading 0's from key material during PKCS11 import in
nss/lib/freebl/ecl/ecp_25519.c, nss/lib/pk11wrap/pk11akey.c,
nss/lib/pk11wrap/pk11cert.c, nss/lib/pk11wrap/pk11pk12.c,
nss/lib/softoken/legacydb/lgattr.c, nss/lib/softoken/pkcs11c.c.
- CVE-2019-11719
* SECURITY UPDATE: segfault via empty or malformed p256-ECDH public keys
- debian/patches/CVE-2019-11729-1.patch: more thorough input checking
in nss/lib/cryptohi/seckey.c, nss/lib/freebl/dh.c,
nss/lib/freebl/ec.c, nss/lib/util/quickder.c.
- CVE-2019-11729
-- Marc Deslauriers <email address hidden> Fri, 12 Jul 2019 08:23:50 -0400
-
nss (2:3.28.4-0ubuntu0.16.04.5) xenial-security; urgency=medium
* SECURITY UPDATE: DoS in NULL pointer dereference in CMS functions
- debian/patches/CVE-2018-18508-1.patch: add null checks in
nss/lib/smime/cmscinfo.c, nss/lib/smime/cmsdigdata.c,
nss/lib/smime/cmsencdata.c, nss/lib/smime/cmsenvdata.c,
nss/lib/smime/cmsmessage.c, nss/lib/smime/cmsudf.c.
- debian/patches/CVE-2018-18508-2.patch: add null checks in
nss/lib/smime/cmsmessage.c.
- CVE-2018-18508
-- Marc Deslauriers <email address hidden> Tue, 19 Feb 2019 13:39:44 +0100
-
nss (2:3.28.4-0ubuntu0.16.04.4) xenial-security; urgency=medium
* SECURITY UPDATE: side-channel attack on ECDSA signatures
- debian/patches/CVE-2018-0495.patch: improve ecdsa and dsa in
nss/lib/freebl/dsa.c, nss/lib/freebl/ec.c.
- CVE-2018-0495
* SECURITY UPDATE: ServerHello.random is all zero in v2 ClientHello
- debian/patches/CVE-2018-12384-1.patch: fix random logic in
nss/lib/ssl/ssl3con.c.
- debian/patches/CVE-2018-12384-2.patch: add tests to
nss/gtests/ssl_gtest/ssl_loopback_unittest.cc,
nss/gtests/ssl_gtest/ssl_v2_client_hello_unittest.cc.
- CVE-2018-12384
* SECURITY UPDATE: cache side-channel variant of the Bleichenbacher attack
- debian/patches/CVE-2018-12404-1.patch: improve RSA key exchange
handling in nss/lib/ssl/ssl3con.c.
- debian/patches/CVE-2018-12404-3.patch: add constant time
mp_to_fixlen_octets in nss/gtests/freebl_gtest/mpi_unittest.cc,
nss/lib/freebl/mpi/mpi.c, nss/lib/freebl/mpi/mpi.h.
- CVE-2018-12404
-- Marc Deslauriers <email address hidden> Fri, 14 Dec 2018 09:59:33 -0500
-
nss (2:3.28.4-0ubuntu0.16.04.3) xenial-security; urgency=medium
* SECURITY UPDATE: Use-after-free in TLS 1.2 generating handshake hashes
- debian/patches/CVE-2017-7805.patch: Simplify handling of
CertificateVerify in nss/lib/ssl/ssl3con.c, nss/lib/ssl/ssl3prot.h.
- CVE-2017-7805
-- Marc Deslauriers <email address hidden> Fri, 29 Sep 2017 08:54:11 -0400
-
nss (2:3.28.4-0ubuntu0.16.04.2) xenial-security; urgency=medium
* SECURITY UPDATE: DoS via empty SSLv2 messages
- debian/patches/CVE-2017-7502.patch: reject broken v2 records in
nss/lib/ssl/ssl3gthr.c, nss/lib/ssl/ssldef.c, nss/lib/ssl/sslimpl.h,
added tests to nss/gtests/ssl_gtest/ssl_gather_unittest.cc,
nss/gtests/ssl_gtest/ssl_gtest.gyp, nss/gtests/ssl_gtest/manifest.mn,
nss/gtests/ssl_gtest/ssl_v2_client_hello_unittest.cc.
- CVE-2017-7502
-- Marc Deslauriers <email address hidden> Fri, 16 Jun 2017 08:13:46 -0400
-
nss (2:3.28.4-0ubuntu0.16.04.1) xenial-security; urgency=medium
* Updated to upstream 3.28.4 to fix security issues and get a new CA
certificate bundle.
* SECURITY UPDATE: DES and Triple DES ciphers birthday attack
- CVE-2016-2183
* SECURITY UPDATE: out-of-bounds write in Base64 decoding
- CVE-2017-5461
* debian/patches/*.patch: refreshed for new version.
* debian/control: bump libnspr4-dev to 4.13.1.
* debian/libnss3.symbols: added new symbols.
-- Marc Deslauriers <email address hidden> Wed, 26 Apr 2017 10:25:43 -0400
-
nss (2:3.26.2-0ubuntu0.16.04.2) xenial-security; urgency=medium
* Updated to upstream 3.26.2 to fix security issues and get a new CA
certificate bundle.
* SECURITY UPDATE: denial of service via invalid DH keys
- CVE-2016-5285
* SECURITY UPDATE: small subgroup confinement attack
- CVE-2016-8635
* SECURITY UPDATE: insufficient mitigation of timing side-channel attack
- CVE-2016-9074
* debian/rules: added libfreeblpriv3.so.
* debian/libnss3.symbols: updated for new version, added
SSL_GetCipherSuiteInfo and SSL_GetChannelInfo as they are not backwards
compatible.
* debian/patches/*.patch: refreshed for new version.
* debian/rules: When building with -O3, build with -Wno-error=maybe-
uninitialized to fix FTBFS on ppc64el and powerpc.
-- Marc Deslauriers <email address hidden> Mon, 05 Dec 2016 07:17:18 -0500
-
nss (2:3.23-0ubuntu0.16.04.1) xenial-security; urgency=medium
* Updated to upstream 3.23 to fix a security issue and get a new CA
certificate bundle.
* SECURITY UPDATE: multiple memory safety issues
- CVE-2016-2834
* debian/control: bump libnspr4-dev Build-Depends to 2:4.12.
* debian/libnss3.symbols: updated for new version.
* debian/patches/CVE-2016-1950.patch: dropped, upstream.
* debian/patches/ftbfs_ppc64el.patch: dropped, no longer needed.
* debian/patches/*.patch: refreshed for new version.
-- Marc Deslauriers <email address hidden> Thu, 07 Jul 2016 12:44:16 -0400
-
nss (2:3.21-1ubuntu4) xenial; urgency=medium
* SECURITY UPDATE: buffer overflow during ASN.1 decoding
- debian/patches/CVE-2016-1950.patch: check lengths in
nss/lib/util/secasn1d.c.
- CVE-2016-1950
-- Marc Deslauriers <email address hidden> Wed, 09 Mar 2016 07:35:32 -0500
-
nss (2:3.21-1ubuntu3) xenial; urgency=medium
* debian/patches/relax_dh_size.patch: removed, now require a minimum DH
size of 1023 bits.
-- Marc Deslauriers <email address hidden> Thu, 18 Feb 2016 11:23:15 -0500
-
nss (2:3.21-1ubuntu2) xenial; urgency=medium
* debian/patches/ftbfs_ppc64el.patch: don't enable -Werror on ppc64el,
there are too many uninitialized variable false positives.
-- Marc Deslauriers <email address hidden> Thu, 26 Nov 2015 14:49:56 -0500
-
nss (2:3.21-1ubuntu1) xenial; urgency=medium
* Merge from Debian unstable. Remaining changes:
- debian/rules:
+ Add x32 support.
+ Also ship blapi.h and alghmac.h in libnss3-dev.
- debian/control, debian/libnss3-nssdb.*, debian/libnss3.symbols,
debian/pkcs11.txt, debian/rules:
+ Add back support for shared cert and key databases.
- debian/patches/relax_dh_size.patch: relax minimum DH size to 768 bits
for compatibility reasons. This patch will get reverted in the future
once servers have upgraded to longer DH sizes.
- debian/control: remove cross Build Profile from Build-Depends, as it
doesn't seem to be supported by launchpad yet.
nss (2:3.21-1) unstable; urgency=medium
* New upstream release.
* nss/lib/ssl/sslsock.c: Disable transitional scheme for SSL renegotiation.
5 years after the transition started, it shouldn't be necessary anymore.
* nss/lib/ckfw/builtins/certdata.txt: Remove the SPI CA.
* nss/lib/util/secload.c: Fix a warning introduced by our patch to this file.
* debian/libnss3.symbols: Add NSS_3.21 symbol versions.
nss (2:3.20.1-1) unstable; urgency=high
* New upstream release.
* Fixes mfsa2015-133. also known as CVE-2015-7181 and CVE-2015-7182.
nss (2:3.20-1) unstable; urgency=medium
* New upstream release.
* Removed patch for __DATE__ and __TIME__ references from 2:3.19.1-1 because
the parts that matter were applied upstream.
* debian/rules: Move USE_64 to common make flags, and always use
DEB_HOST_ARCH_BITS since it's even supported by dpkg in oldstable, now.
* debian/libnss3.symbols: Add NSS_3.20 symbol versions.
-- Marc Deslauriers <email address hidden> Thu, 26 Nov 2015 08:55:09 -0500
-
nss (2:3.19.2.1-0ubuntu1) xenial; urgency=medium
* Updated to upstream 3.19.2.1 to fix two security issues.
* SECURITY UPDATE: use-after-poison in sec_asn1d_parse_leaf
- CVE-2015-7181
* SECURITY UPDATE: ASN.1 decoder heap overflow
- CVE-2015-7182
-- Marc Deslauriers <email address hidden> Wed, 04 Nov 2015 10:33:01 -0600
-
nss (2:3.19.2-1ubuntu1) wily; urgency=medium
* Merge from Debian unstable. Remaining changes:
- debian/rules:
+ Add x32 support.
+ Also ship blapi.h and alghmac.h in libnss3-dev.
- debian/control, debian/libnss3-nssdb.*, debian/libnss3.symbols,
debian/pkcs11.txt, debian/rules:
+ Add back support for shared cert and key databases.
* debian/patches/relax_dh_size.patch: relax minimum DH size to 768 bits
for compatibility reasons. This patch will get reverted in the future
once servers have upgraded to longer DH sizes.
* debian/control: remove cross Build Profile from Build-Depends, as it
doesn't seem to be supported by launchpad yet.
nss (2:3.19.2-1) unstable; urgency=medium
* New upstream release.
* debian/rules: Force set OS_TEST to DEB_HOST_GNU_CPU to avoid it defaulting
to `uname -m`. Thanks Helmut Grohne. Closes: #788452
nss (2:3.19.1-2) unstable; urgency=medium
* debian/control: Fix Vcs-Git url.
* nss/cmd/shlibsign/manifest.mn: Fix missing LIBRARY_VERSION.
* nss/cmd/shlibsign/shlibsign.c: Fix shlibsign on arm64.
nss (2:3.19.1-1) unstable; urgency=medium
* New upstream release.
* debian/libnss3.symbols:
- Add NSS_3.19.1 symbol versions.
- Reorder and replace *@ with (symver).
* debian/rules:
- Pass multi-arch dir for NSPR_LIB_DIR. Closes: #722811.
- Set umask when calling shlibsign, and rearrange how it's being called.
- Build nsinstall separately and set things up for cross-compilations.
- Use native shlibsign when cross-compiling.
- Do not run FIPS check on cross-builds.
* debian/control: Build depend on native libnss3-tools for cross builds.
Closes: #682926.
* debian/libnss3-tools.manpages, debian/rules: Install the manpages that
are now provided upstream. Closes: #505382.
* debian/control: Update Vcs-* urls.
* debian/control: Bump Standards-Version to 3.9.6.0. No changes required.
* nss/lib/ckfw/builtins/binst.c, nss/lib/ckfw/builtins/ckbiver.c,
nss/lib/ckfw/builtins/manifest.mn, nss/lib/ckfw/capi/ckcapiver.c,
nss/lib/ckfw/capi/manifest.mn, nss/lib/ckfw/nssmkey/ckmkver.c,
nss/lib/ckfw/nssmkey/manifest.mn, nss/lib/freebl/freeblver.c,
nss/lib/freebl/ldvector.c, nss/lib/freebl/manifest.mn,
nss/lib/nss/manifest.mn, nss/lib/nss/nssinit.c, nss/lib/nss/nssver.c,
nss/lib/smime/manifest.mn, nss/lib/smime/smimeutil.c,
nss/lib/smime/smimever.c, nss/lib/softoken/legacydb/lginit.c,
nss/lib/softoken/manifest.mn, nss/lib/softoken/pkcs11.c,
nss/lib/softoken/softkver.c, nss/lib/ssl/manifest.mn,
nss/lib/ssl/sslcon.c, nss/lib/ssl/sslver.c, nss/lib/util/secoid.c: Remove
__DATE__ and __TIME__ references.
* nss/cmd/shlibsign/Makefile, nss/cmd/shlibsign/manifest.mn,
nss/cmd/shlibsign/shlibsign.c: Fix shlibsign to properly load the sotfoken
module.
* debian/rules: Remove debian/libnss3/usr/lib/$(DEB_HOST_MULTIARCH)/nss from
LD_LIBRARY_PATH when executing shlibsign, which can be done now with the
fix above.
-- Marc Deslauriers <email address hidden> Wed, 08 Jul 2015 09:29:03 -0400