A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
{
"binaries": [
{
"binary_name": "libnss3",
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm8"
},
{
"binary_name": "libnss3-1d",
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm8"
},
{
"binary_name": "libnss3-dev",
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm8"
},
{
"binary_name": "libnss3-nssdb",
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm8"
},
{
"binary_name": "libnss3-tools",
"binary_version": "2:3.28.4-0ubuntu0.14.04.5+esm8"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"binaries": [
{
"binary_name": "libnss3",
"binary_version": "2:3.28.4-0ubuntu0.16.04.14"
},
{
"binary_name": "libnss3-1d",
"binary_version": "2:3.28.4-0ubuntu0.16.04.14"
},
{
"binary_name": "libnss3-dev",
"binary_version": "2:3.28.4-0ubuntu0.16.04.14"
},
{
"binary_name": "libnss3-nssdb",
"binary_version": "2:3.28.4-0ubuntu0.16.04.14"
},
{
"binary_name": "libnss3-tools",
"binary_version": "2:3.28.4-0ubuntu0.16.04.14"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "libnss3",
"binary_version": "2:3.35-2ubuntu2.12"
},
{
"binary_name": "libnss3-dev",
"binary_version": "2:3.35-2ubuntu2.12"
},
{
"binary_name": "libnss3-tools",
"binary_version": "2:3.35-2ubuntu2.12"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "libnss3",
"binary_version": "2:3.49.1-1ubuntu1.5"
},
{
"binary_name": "libnss3-dev",
"binary_version": "2:3.49.1-1ubuntu1.5"
},
{
"binary_name": "libnss3-tools",
"binary_version": "2:3.49.1-1ubuntu1.5"
}
],
"availability": "No subscription required"
}