Change logs for nss source package in Xenial

  • nss (2:3.28.4-0ubuntu0.16.04.14) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Out-of-bounds read
        - debian/patches/CVE-2020-12403-2.patch: fix incorrect call to ChaChaPoly1305 by PKCS11
          in nss/lib/freebl/chacha20poly1305.c.
        - CVE-2020-12403
    
     -- <email address hidden> (Leonidas S. Barbosa)  Fri, 21 Aug 2020 15:41:08 -0300
  • nss (2:3.28.4-0ubuntu0.16.04.13) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Side-channel attack
        - debian/patches/CVE-2020-12400-and-6829-*.patch: use constant-time
          P-384 and P-521 in nss/lib/freebl/ecl/ecl-priv.h, nss/lib/freebl/ecl/ecl.c,
          nss/lib/freebl/ecl/ecl_spec384r1.c, nss/lib/freebl/freebl_base.gypi,
          nss/lib/freebl/manifest.mn, nss/test/ec/ectest.sh.
        - CVE-2020-12400
        - CVE-2020-6829
      * SECURITY UPDATE: Timing attack mitigation bypass
        - debian/patches/CVE-2020-12401.patch: remove unnecessary scalar
          padding in nss/lib/freebl/ec.c.
        - CVE-2020-12401
    
     -- <email address hidden> (Leonidas S. Barbosa)  Wed, 05 Aug 2020 16:20:52 -0300
  • nss (2:3.28.4-0ubuntu0.16.04.12) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Side channel vulnerabilities during RSA key generation
        - debian/patches/CVE-2020-12402.patch: use constant-time GCD and
          modular inversion in nss/lib/freebl/mpi/mpi.c,
          nss/lib/freebl/mpi/mpi.h, nss/lib/freebl/mpi/mplogic.c.
        - CVE-2020-12402
    
     -- Marc Deslauriers <email address hidden>  Mon, 22 Jun 2020 13:36:54 -0400
  • nss (2:3.28.4-0ubuntu0.16.04.11) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Timing attack during DSA key generation
        - debian/patches/CVE-2020-12399.patch: force a fixed length for DSA
          exponentiation in nss/lib/freebl/dsa.c.
        - CVE-2020-12399
    
     -- Marc Deslauriers <email address hidden>  Thu, 11 Jun 2020 09:45:43 -0400
  • nss (2:3.28.4-0ubuntu0.16.04.10) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Possible wrong length for cryptographic primitives input
        - debian/patches/CVE-2019-17006.patch: adds checks for length of crypto
          primitives in nss/lib/freebl/chacha20poly1305.c,
          nss/lib/freebl/ctr.c, nss/lib/freebl/gcm.c,
          nss/lib/freebl/intel-gcm-wrap.c,
          nss/lib/freebl/rsapkcs.c.
        - CVE-2019-17006
    
     -- <email address hidden> (Leonidas S. Barbosa)  Tue, 07 Jan 2020 14:42:06 -0300
  • nss (2:3.28.4-0ubuntu0.16.04.9) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2019-17007.patch: check got some certs in
          collect_certs r=jcj in nss/lib/pkcs7/certread.c.
        - CVE-2019-17007
    
     -- <email address hidden> (Leonidas S. Barbosa)  Thu, 05 Dec 2019 13:25:47 -0300
  • nss (2:3.28.4-0ubuntu0.16.04.8) xenial-security; urgency=medium
    
      * SECURITY UPDATE: out-of-bounds write in NSC_EncryptUpdate
        - debian/patches/CVE-2019-11745.patch: use maxout not block size in
          nss/lib/softoken/pkcs11c.c.
        - CVE-2019-11745
      * Note: this does _not_ contain the changes from
        2:3.28.4-0ubuntu0.16.04.7 in xenial-proposed.
    
     -- Marc Deslauriers <email address hidden>  Tue, 26 Nov 2019 08:53:56 -0500
  • nss (2:3.28.4-0ubuntu0.16.04.7) xenial; urgency=medium
    
      * disable reading fips_enabled flag and enabling FIPS mode
        automatically on a FIPS machine. libnss is not a FIPS
        certified library. (LP: #1837734)
    
     -- Vineetha Kamath <email address hidden>  Tue, 23 Jul 2019 11:38:29 -0400
  • nss (2:3.28.4-0ubuntu0.16.04.6) xenial-security; urgency=medium
    
      * SECURITY UPDATE: OOB read when importing a curve25519 private key
        - debian/patches/CVE-2019-11719.patch: don't unnecessarily strip
          leading 0's from key material during PKCS11 import in
          nss/lib/freebl/ecl/ecp_25519.c, nss/lib/pk11wrap/pk11akey.c,
          nss/lib/pk11wrap/pk11cert.c, nss/lib/pk11wrap/pk11pk12.c,
          nss/lib/softoken/legacydb/lgattr.c, nss/lib/softoken/pkcs11c.c.
        - CVE-2019-11719
      * SECURITY UPDATE: segfault via empty or malformed p256-ECDH public keys
        - debian/patches/CVE-2019-11729-1.patch: more thorough input checking
          in nss/lib/cryptohi/seckey.c, nss/lib/freebl/dh.c,
          nss/lib/freebl/ec.c, nss/lib/util/quickder.c.
        - CVE-2019-11729
    
     -- Marc Deslauriers <email address hidden>  Fri, 12 Jul 2019 08:23:50 -0400
  • nss (2:3.28.4-0ubuntu0.16.04.5) xenial-security; urgency=medium
    
      * SECURITY UPDATE: DoS in NULL pointer dereference in CMS functions
        - debian/patches/CVE-2018-18508-1.patch: add null checks in
          nss/lib/smime/cmscinfo.c, nss/lib/smime/cmsdigdata.c,
          nss/lib/smime/cmsencdata.c, nss/lib/smime/cmsenvdata.c,
          nss/lib/smime/cmsmessage.c, nss/lib/smime/cmsudf.c.
        - debian/patches/CVE-2018-18508-2.patch: add null checks in
          nss/lib/smime/cmsmessage.c.
        - CVE-2018-18508
    
     -- Marc Deslauriers <email address hidden>  Tue, 19 Feb 2019 13:39:44 +0100
  • nss (2:3.28.4-0ubuntu0.16.04.4) xenial-security; urgency=medium
    
      * SECURITY UPDATE: side-channel attack on ECDSA signatures
        - debian/patches/CVE-2018-0495.patch: improve ecdsa and dsa in
          nss/lib/freebl/dsa.c, nss/lib/freebl/ec.c.
        - CVE-2018-0495
      * SECURITY UPDATE: ServerHello.random is all zero in v2 ClientHello
        - debian/patches/CVE-2018-12384-1.patch: fix random logic in
          nss/lib/ssl/ssl3con.c.
        - debian/patches/CVE-2018-12384-2.patch: add tests to
          nss/gtests/ssl_gtest/ssl_loopback_unittest.cc,
          nss/gtests/ssl_gtest/ssl_v2_client_hello_unittest.cc.
        - CVE-2018-12384
      * SECURITY UPDATE: cache side-channel variant of the Bleichenbacher attack
        - debian/patches/CVE-2018-12404-1.patch: improve RSA key exchange
          handling in nss/lib/ssl/ssl3con.c.
        - debian/patches/CVE-2018-12404-3.patch: add constant time
          mp_to_fixlen_octets in nss/gtests/freebl_gtest/mpi_unittest.cc,
          nss/lib/freebl/mpi/mpi.c, nss/lib/freebl/mpi/mpi.h.
        - CVE-2018-12404
    
     -- Marc Deslauriers <email address hidden>  Fri, 14 Dec 2018 09:59:33 -0500
  • nss (2:3.28.4-0ubuntu0.16.04.3) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Use-after-free in TLS 1.2 generating handshake hashes
        - debian/patches/CVE-2017-7805.patch: Simplify handling of
          CertificateVerify in nss/lib/ssl/ssl3con.c, nss/lib/ssl/ssl3prot.h.
        - CVE-2017-7805
    
     -- Marc Deslauriers <email address hidden>  Fri, 29 Sep 2017 08:54:11 -0400
  • nss (2:3.28.4-0ubuntu0.16.04.2) xenial-security; urgency=medium
    
      * SECURITY UPDATE: DoS via empty SSLv2 messages
        - debian/patches/CVE-2017-7502.patch: reject broken v2 records in
          nss/lib/ssl/ssl3gthr.c, nss/lib/ssl/ssldef.c, nss/lib/ssl/sslimpl.h,
          added tests to nss/gtests/ssl_gtest/ssl_gather_unittest.cc,
          nss/gtests/ssl_gtest/ssl_gtest.gyp, nss/gtests/ssl_gtest/manifest.mn,
          nss/gtests/ssl_gtest/ssl_v2_client_hello_unittest.cc.
        - CVE-2017-7502
    
     -- Marc Deslauriers <email address hidden>  Fri, 16 Jun 2017 08:13:46 -0400
  • nss (2:3.28.4-0ubuntu0.16.04.1) xenial-security; urgency=medium
    
      * Updated to upstream 3.28.4 to fix security issues and get a new CA
        certificate bundle.
      * SECURITY UPDATE: DES and Triple DES ciphers birthday attack
        - CVE-2016-2183
      * SECURITY UPDATE: out-of-bounds write in Base64 decoding
        - CVE-2017-5461
      * debian/patches/*.patch: refreshed for new version.
      * debian/control: bump libnspr4-dev to 4.13.1.
      * debian/libnss3.symbols: added new symbols.
    
     -- Marc Deslauriers <email address hidden>  Wed, 26 Apr 2017 10:25:43 -0400
  • nss (2:3.26.2-0ubuntu0.16.04.2) xenial-security; urgency=medium
    
      * Updated to upstream 3.26.2 to fix security issues and get a new CA
        certificate bundle.
      * SECURITY UPDATE: denial of service via invalid DH keys
        - CVE-2016-5285
      * SECURITY UPDATE: small subgroup confinement attack
        - CVE-2016-8635
      * SECURITY UPDATE: insufficient mitigation of timing side-channel attack
        - CVE-2016-9074
      * debian/rules: added libfreeblpriv3.so.
      * debian/libnss3.symbols: updated for new version, added
        SSL_GetCipherSuiteInfo and SSL_GetChannelInfo as they are not backwards
        compatible.
      * debian/patches/*.patch: refreshed for new version.
      * debian/rules: When building with -O3, build with -Wno-error=maybe-
        uninitialized to fix FTBFS on ppc64el and powerpc.
    
     -- Marc Deslauriers <email address hidden>  Mon, 05 Dec 2016 07:17:18 -0500
  • nss (2:3.23-0ubuntu0.16.04.1) xenial-security; urgency=medium
    
      * Updated to upstream 3.23 to fix a security issue and get a new CA
        certificate bundle.
      * SECURITY UPDATE: multiple memory safety issues
        - CVE-2016-2834
      * debian/control: bump libnspr4-dev Build-Depends to 2:4.12.
      * debian/libnss3.symbols: updated for new version.
      * debian/patches/CVE-2016-1950.patch: dropped, upstream.
      * debian/patches/ftbfs_ppc64el.patch: dropped, no longer needed.
      * debian/patches/*.patch: refreshed for new version.
    
     -- Marc Deslauriers <email address hidden>  Thu, 07 Jul 2016 12:44:16 -0400
  • nss (2:3.21-1ubuntu4) xenial; urgency=medium
    
      * SECURITY UPDATE: buffer overflow during ASN.1 decoding
        - debian/patches/CVE-2016-1950.patch: check lengths in
          nss/lib/util/secasn1d.c.
        - CVE-2016-1950
    
     -- Marc Deslauriers <email address hidden>  Wed, 09 Mar 2016 07:35:32 -0500
  • nss (2:3.21-1ubuntu3) xenial; urgency=medium
    
      * debian/patches/relax_dh_size.patch: removed, now require a minimum DH
        size of 1023 bits.
    
     -- Marc Deslauriers <email address hidden>  Thu, 18 Feb 2016 11:23:15 -0500
  • nss (2:3.21-1ubuntu2) xenial; urgency=medium
    
      * debian/patches/ftbfs_ppc64el.patch: don't enable -Werror on ppc64el,
        there are too many uninitialized variable false positives.
    
     -- Marc Deslauriers <email address hidden>  Thu, 26 Nov 2015 14:49:56 -0500
  • nss (2:3.21-1ubuntu1) xenial; urgency=medium
    
      * Merge from Debian unstable. Remaining changes:
        - debian/rules:
          + Add x32 support.
          + Also ship blapi.h and alghmac.h in libnss3-dev.
        - debian/control, debian/libnss3-nssdb.*, debian/libnss3.symbols,
          debian/pkcs11.txt, debian/rules:
          + Add back support for shared cert and key databases.
        - debian/patches/relax_dh_size.patch: relax minimum DH size to 768 bits
          for compatibility reasons. This patch will get reverted in the future
          once servers have upgraded to longer DH sizes.
        - debian/control: remove cross Build Profile from Build-Depends, as it
          doesn't seem to be supported by launchpad yet.
    
    nss (2:3.21-1) unstable; urgency=medium
    
      * New upstream release.
      * nss/lib/ssl/sslsock.c: Disable transitional scheme for SSL renegotiation.
        5 years after the transition started, it shouldn't be necessary anymore.
      * nss/lib/ckfw/builtins/certdata.txt: Remove the SPI CA.
      * nss/lib/util/secload.c: Fix a warning introduced by our patch to this file.
      * debian/libnss3.symbols: Add NSS_3.21 symbol versions.
    
    nss (2:3.20.1-1) unstable; urgency=high
    
      * New upstream release.
      * Fixes mfsa2015-133. also known as CVE-2015-7181 and CVE-2015-7182.
    
    nss (2:3.20-1) unstable; urgency=medium
    
      * New upstream release.
      * Removed patch for __DATE__ and __TIME__ references from 2:3.19.1-1 because
        the parts that matter were applied upstream.
      * debian/rules: Move USE_64 to common make flags, and always use
        DEB_HOST_ARCH_BITS since it's even supported by dpkg in oldstable, now.
      * debian/libnss3.symbols: Add NSS_3.20 symbol versions.
    
     -- Marc Deslauriers <email address hidden>  Thu, 26 Nov 2015 08:55:09 -0500
  • nss (2:3.19.2.1-0ubuntu1) xenial; urgency=medium
    
      * Updated to upstream 3.19.2.1 to fix two security issues.
      * SECURITY UPDATE: use-after-poison in sec_asn1d_parse_leaf
        - CVE-2015-7181
      * SECURITY UPDATE: ASN.1 decoder heap overflow
        - CVE-2015-7182
    
     -- Marc Deslauriers <email address hidden>  Wed, 04 Nov 2015 10:33:01 -0600
  • nss (2:3.19.2-1ubuntu1) wily; urgency=medium
    
      * Merge from Debian unstable. Remaining changes:
        - debian/rules:
          + Add x32 support.
          + Also ship blapi.h and alghmac.h in libnss3-dev.
        - debian/control, debian/libnss3-nssdb.*, debian/libnss3.symbols,
          debian/pkcs11.txt, debian/rules:
          + Add back support for shared cert and key databases.
      * debian/patches/relax_dh_size.patch: relax minimum DH size to 768 bits
        for compatibility reasons. This patch will get reverted in the future
        once servers have upgraded to longer DH sizes.
      * debian/control: remove cross Build Profile from Build-Depends, as it
        doesn't seem to be supported by launchpad yet.
    
    nss (2:3.19.2-1) unstable; urgency=medium
    
      * New upstream release.
      * debian/rules: Force set OS_TEST to DEB_HOST_GNU_CPU to avoid it defaulting
        to `uname -m`. Thanks Helmut Grohne. Closes: #788452
    
    nss (2:3.19.1-2) unstable; urgency=medium
    
      * debian/control: Fix Vcs-Git url.
      * nss/cmd/shlibsign/manifest.mn: Fix missing LIBRARY_VERSION.
      * nss/cmd/shlibsign/shlibsign.c: Fix shlibsign on arm64.
    
    nss (2:3.19.1-1) unstable; urgency=medium
    
      * New upstream release.
      * debian/libnss3.symbols:
        - Add NSS_3.19.1 symbol versions.
        - Reorder and replace *@ with (symver).
      * debian/rules:
        - Pass multi-arch dir for NSPR_LIB_DIR. Closes: #722811.
        - Set umask when calling shlibsign, and rearrange how it's being called.
        - Build nsinstall separately and set things up for cross-compilations.
        - Use native shlibsign when cross-compiling.
        - Do not run FIPS check on cross-builds.
      * debian/control: Build depend on native libnss3-tools for cross builds.
        Closes: #682926.
      * debian/libnss3-tools.manpages, debian/rules: Install the manpages that
        are now provided upstream. Closes: #505382.
      * debian/control: Update Vcs-* urls.
      * debian/control: Bump Standards-Version to 3.9.6.0. No changes required.
      * nss/lib/ckfw/builtins/binst.c, nss/lib/ckfw/builtins/ckbiver.c,
        nss/lib/ckfw/builtins/manifest.mn, nss/lib/ckfw/capi/ckcapiver.c,
        nss/lib/ckfw/capi/manifest.mn, nss/lib/ckfw/nssmkey/ckmkver.c,
        nss/lib/ckfw/nssmkey/manifest.mn, nss/lib/freebl/freeblver.c,
        nss/lib/freebl/ldvector.c, nss/lib/freebl/manifest.mn,
        nss/lib/nss/manifest.mn, nss/lib/nss/nssinit.c, nss/lib/nss/nssver.c,
        nss/lib/smime/manifest.mn, nss/lib/smime/smimeutil.c,
        nss/lib/smime/smimever.c, nss/lib/softoken/legacydb/lginit.c,
        nss/lib/softoken/manifest.mn, nss/lib/softoken/pkcs11.c,
        nss/lib/softoken/softkver.c, nss/lib/ssl/manifest.mn,
        nss/lib/ssl/sslcon.c, nss/lib/ssl/sslver.c, nss/lib/util/secoid.c: Remove
        __DATE__ and __TIME__ references.
      * nss/cmd/shlibsign/Makefile, nss/cmd/shlibsign/manifest.mn,
        nss/cmd/shlibsign/shlibsign.c: Fix shlibsign to properly load the sotfoken
        module.
      * debian/rules: Remove debian/libnss3/usr/lib/$(DEB_HOST_MULTIARCH)/nss from
        LD_LIBRARY_PATH when executing shlibsign, which can be done now with the
        fix above.
    
     -- Marc Deslauriers <email address hidden>  Wed, 08 Jul 2015 09:29:03 -0400