First published: Tue Jun 16 2020(Updated: )
It was discovered that NSS incorrectly handled the TLS State Machine. A remote attacker could possibly use this issue to cause NSS to hang, resulting in a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 19.10. (CVE-2019-17023) Cesar Pereida Garcia discovered that NSS incorrectly handled DSA key generation. A local attacker could possibly use this issue to perform a timing attack and recover DSA keys. (CVE-2020-12399)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libnss3 | <2:3.49.1-1ubuntu1.1 | 2:3.49.1-1ubuntu1.1 |
=20.04 | ||
All of | ||
ubuntu/libnss3 | <2:3.45-1ubuntu2.3 | 2:3.45-1ubuntu2.3 |
=19.10 | ||
All of | ||
ubuntu/libnss3 | <2:3.35-2ubuntu2.8 | 2:3.35-2ubuntu2.8 |
=18.04 | ||
All of | ||
ubuntu/libnss3 | <2:3.28.4-0ubuntu0.16.04.11 | 2:3.28.4-0ubuntu0.16.04.11 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this advisory is USN-4397-1.
The libnss3 package in Ubuntu 16.04, 18.04, 19.10, and 20.04 LTS is affected by this vulnerability.
The severity of the vulnerability is not mentioned in the provided information.
To fix the vulnerability, update the libnss3 package to version 2:3.49.1-1ubuntu1.1 for Ubuntu 18.04 LTS and Ubuntu 19.10, or version 2:3.45-1ubuntu2.3 for Ubuntu 20.04 LTS.
More information about this vulnerability can be found on the Ubuntu Security Notices page: [USN-4397-1](https://ubuntu.com/security/notices/USN-4397-1)