A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "libnss3-nssdb": "2:3.28.4-0ubuntu0.14.04.5+esm8", "libnss3-1d": "2:3.28.4-0ubuntu0.14.04.5+esm8", "libnss3-dbgsym": "2:3.28.4-0ubuntu0.14.04.5+esm8", "libnss3": "2:3.28.4-0ubuntu0.14.04.5+esm8", "libnss3-dev": "2:3.28.4-0ubuntu0.14.04.5+esm8", "libnss3-dbg": "2:3.28.4-0ubuntu0.14.04.5+esm8", "libnss3-tools": "2:3.28.4-0ubuntu0.14.04.5+esm8", "libnss3-tools-dbgsym": "2:3.28.4-0ubuntu0.14.04.5+esm8" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libnss3-nssdb": "2:3.28.4-0ubuntu0.16.04.14", "libnss3-1d": "2:3.28.4-0ubuntu0.16.04.14", "libnss3-dbgsym": "2:3.28.4-0ubuntu0.16.04.14", "libnss3": "2:3.28.4-0ubuntu0.16.04.14", "libnss3-dev": "2:3.28.4-0ubuntu0.16.04.14", "libnss3-dbg": "2:3.28.4-0ubuntu0.16.04.14", "libnss3-tools": "2:3.28.4-0ubuntu0.16.04.14", "libnss3-tools-dbgsym": "2:3.28.4-0ubuntu0.16.04.14" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libnss3-tools": "2:3.49.1-1ubuntu1.5", "libnss3-dbgsym": "2:3.49.1-1ubuntu1.5", "libnss3": "2:3.49.1-1ubuntu1.5", "libnss3-dev": "2:3.49.1-1ubuntu1.5", "libnss3-tools-dbgsym": "2:3.49.1-1ubuntu1.5" } ] }