Linux Security
    Linux Security
    Linux Security

    Debian LTS: DLA-2388-1: nss security update

    Date
    131
    Posted By
    Various vulnerabilities were fixed in nss, the Network Security Service libraries. CVE-2018-12404
    
    - -------------------------------------------------------------------------
    Debian LTS Advisory DLA-2388-1                This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/lts/security/                          Adrian Bunk
    September 29, 2020                            https://wiki.debian.org/LTS
    - -------------------------------------------------------------------------
    
    Package        : nss
    Version        : 2:3.26.2-1.1+deb9u2
    CVE ID         : CVE-2018-12404 CVE-2018-18508 CVE-2019-11719 CVE-2019-11729 
                     CVE-2019-11745 CVE-2019-17006 CVE-2019-17007 CVE-2020-6829 
                     CVE-2020-12399 CVE-2020-12400 CVE-2020-12401 CVE-2020-12402 
                     CVE-2020-12403
    Debian Bug     : 921614 961752 963152
    
    Various vulnerabilities were fixed in nss,
    the Network Security Service libraries.
    
    CVE-2018-12404
    
        Cache side-channel variant of the Bleichenbacher attack.
    
    CVE-2018-18508
    
        NULL pointer dereference in several CMS functions resulting in a 
        denial of service.
    
    CVE-2019-11719
    
        Out-of-bounds read when importing curve25519 private key.
    
    CVE-2019-11729
    
        Empty or malformed p256-ECDH public keys may trigger a segmentation 
        fault.
    
    CVE-2019-11745
    
        Out-of-bounds write when encrypting with a block cipher.
    
    CVE-2019-17006
    
        Some cryptographic primitives did not check the length of the input 
        text, potentially resulting in overflows.
    
    CVE-2019-17007
    
        Handling of Netscape Certificate Sequences may crash with a NULL 
        dereference leading to a denial of service.
    
    CVE-2020-12399
    
        Force a fixed length for DSA exponentiation.
    
    CVE-2020-6829
    CVE-2020-12400
    
        Side channel attack on ECDSA signature generation.
    
    CVE-2020-12401
    
        ECDSA timing attack mitigation bypass.
    
    CVE-2020-12402
    
        Side channel vulnerabilities during RSA key generation.
    
    CVE-2020-12403
    
        CHACHA20-POLY1305 decryption with undersized tag leads to 
        out-of-bounds read.
    
    For Debian 9 stretch, these problems have been fixed in version
    2:3.26.2-1.1+deb9u2.
    
    We recommend that you upgrade your nss packages.
    
    For the detailed security status of nss please refer to
    its security tracker page at:
    https://security-tracker.debian.org/tracker/nss
    
    Further information about Debian LTS security advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://wiki.debian.org/LTS
    

    LinuxSecurity Poll

    Tails is the most secure Linux distro out there.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/41-ubuntu-is-a-more-secure-distro-than-fedora?task=poll.vote&format=json
    41
    radio
    [{"id":"142","title":"Yes - Tails get my vote!","votes":"4","type":"x","order":"1","pct":66.67,"resources":[]},{"id":"143","title":"Nope - Parrot OS has surpassed Tails in its security and privacy.","votes":"2","type":"x","order":"2","pct":33.33,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.