Change logs for nss source package in Eoan

  • nss (2:3.45-1ubuntu2.4) eoan-security; urgency=medium
    
      * SECURITY UPDATE: Side channel vulnerabilities during RSA key generation
        - debian/patches/CVE-2020-12402.patch: use constant-time GCD and
          modular inversion in nss/lib/freebl/mpi/mpi.c,
          nss/lib/freebl/mpi/mpi.h, nss/lib/freebl/mpi/mplogic.c.
        - CVE-2020-12402
    
     -- Marc Deslauriers <email address hidden>  Mon, 22 Jun 2020 13:35:40 -0400
  • nss (2:3.45-1ubuntu2.3) eoan-security; urgency=medium
    
      * SECURITY UPDATE: invalid state after HelloRetryRequest
        - debian/patches/CVE-2019-17023-1.patch: prevent negotiation of
          versions lower than 1.3 after HelloRetryRequest in
          nss/lib/ssl/ssl3con.c, nss/lib/ssl/tls13con.c.
        - debian/patches/CVE-2019-17023-2.patch: add new tests for version
          limitations after a HRR in nss/gtests/ssl_gtest/ssl_hrr_unittest.cc.
        - CVE-2019-17023
      * SECURITY UPDATE: Timing attack during DSA key generation
        - debian/patches/CVE-2020-12399.patch: force a fixed length for DSA
          exponentiation in nss/lib/freebl/dsa.c.
        - CVE-2020-12399
    
     -- Marc Deslauriers <email address hidden>  Wed, 10 Jun 2020 12:57:22 -0400
  • nss (2:3.45-1ubuntu2.2) eoan-security; urgency=medium
    
      * SECURITY UPDATE: Possible wrong length for cryptographic primitives input
        - debian/patches/CVE-2019-17006.patch: adds checks for length of crypto
          primitives in nss/lib/freebl/chacha20poly1305.c,
          nss/lib/freebl/ctr.c, nss/lib/freebl/gcm.c,
          nss/lib/freebl/intel-gcm-wrap.c,
          nss/lib/freebl/rsapkcs.c.
        - CVE-2019-17006
    
     -- <email address hidden> (Leonidas S. Barbosa)  Tue, 07 Jan 2020 15:31:35 -0300
  • nss (2:3.45-1ubuntu2.1) eoan-security; urgency=medium
    
      * SECURITY UPDATE: out-of-bounds write in NSC_EncryptUpdate
        - debian/patches/CVE-2019-11745.patch: use maxout not block size in
          nss/lib/softoken/pkcs11c.c.
        - CVE-2019-11745
    
     -- Marc Deslauriers <email address hidden>  Tue, 26 Nov 2019 08:35:22 -0500
  • nss (2:3.45-1ubuntu2) eoan; urgency=medium
    
      * Disable reading fips_enabled flag in FIPS mode. libnss is
        not a FIPS certified library. (LP: #1837734)
    
     -- Vineetha Kamath <email address hidden>  Tue, 23 Jul 2019 20:58:12 +0000
  • nss (2:3.45-1ubuntu1) eoan; urgency=low
    
      * Merge from Debian unstable.  Remaining changes:
        - d/libnss3.links: make freebl3 available as library (LP 1744328)
        - d/control: add dh-exec to Build-Depends
        - d/rules: make mkdir tolerate debian/tmp existing (due to dh-exec)
    
    nss (2:3.45-1) unstable; urgency=medium
    
      * New upstream release.
        - Fixes CVE-2019-11727 and CVE-2019-11719.
      * debian/libnss3.symbols: Add NSS_3_45 symbol version.
    
    nss (2:3.44+really3.42.1-2) unstable; urgency=medium
    
      * debian/rules: Fix version exposed in nss-config and nss.pc.
    
    nss (2:3.44.0-1) experimental; urgency=medium
    
      * debian/libnss3.symbols:
        - Update the version needed for
        SSL_Get{CipherSuite,Channel,PreliminaryChannel}Info.
        - Adjust versions so that 3.44+really3.42.1-1 is considered older where it
        matters.
    
    nss (2:3.44+really3.42.1-1) unstable; urgency=medium
    
      * Reverse to 3.42.1. Building against 3.44 induces some behavior
        differences when running against older versions, which could normally
        be solved with updates to the symbols file, but since 3.44 is not meant
        to ship in Buster, avoid disruption for nss reverse dependencies until
        Buster is released by going back to previous version.
    
    nss (2:3.44-1) unstable; urgency=medium
    
      * New upstream release.
      * debian/libnss3.symbols: Add NSS_3_43 and NSS_3_44 symbol versions.
    
    nss (2:3.42.1-1) unstable; urgency=medium
    
      * New upstream release.
        - Fixes CVE-2018-18508. Closes: #921614.
    
     -- Gianfranco Costamagna <email address hidden>  Thu, 11 Jul 2019 11:49:44 +0200
  • nss (2:3.42-1ubuntu2) disco; urgency=medium
    
      * SECURITY UPDATE: DoS in NULL pointer dereference in CMS functions
        - debian/patches/CVE-2018-18508-1.patch: add null checks in
          nss/lib/smime/cmscinfo.c, nss/lib/smime/cmsdigdata.c,
          nss/lib/smime/cmsencdata.c, nss/lib/smime/cmsenvdata.c,
          nss/lib/smime/cmsmessage.c, nss/lib/smime/cmsudf.c.
        - debian/patches/CVE-2018-18508-2.patch: add null checks in
          nss/lib/smime/cmsmessage.c.
        - CVE-2018-18508
    
     -- Marc Deslauriers <email address hidden>  Tue, 19 Feb 2019 12:04:49 +0100