Change logs for nss source package in Trusty

  • nss (2:3.28.4-0ubuntu0.14.04.5) trusty-security; urgency=medium
    
      * SECURITY UPDATE: DoS in NULL pointer dereference in CMS functions
        - debian/patches/CVE-2018-18508-1.patch: add null checks in
          nss/lib/smime/cmscinfo.c, nss/lib/smime/cmsdigdata.c,
          nss/lib/smime/cmsencdata.c, nss/lib/smime/cmsenvdata.c,
          nss/lib/smime/cmsmessage.c, nss/lib/smime/cmsudf.c.
        - debian/patches/CVE-2018-18508-2.patch: add null checks in
          nss/lib/smime/cmsmessage.c.
        - CVE-2018-18508
    
     -- Marc Deslauriers <email address hidden>  Tue, 19 Feb 2019 14:41:32 +0100
  • nss (2:3.28.4-0ubuntu0.14.04.4) trusty-security; urgency=medium
    
      * SECURITY UPDATE: side-channel attack on ECDSA signatures
        - debian/patches/CVE-2018-0495.patch: improve ecdsa and dsa in
          nss/lib/freebl/dsa.c, nss/lib/freebl/ec.c.
        - CVE-2018-0495
      * SECURITY UPDATE: ServerHello.random is all zero in v2 ClientHello
        - debian/patches/CVE-2018-12384-1.patch: fix random logic in
          nss/lib/ssl/ssl3con.c.
        - debian/patches/CVE-2018-12384-2.patch: add tests to
          nss/gtests/ssl_gtest/ssl_loopback_unittest.cc,
          nss/gtests/ssl_gtest/ssl_v2_client_hello_unittest.cc.
        - CVE-2018-12384
      * SECURITY UPDATE: cache side-channel variant of the Bleichenbacher attack
        - debian/patches/CVE-2018-12404-1.patch: improve RSA key exchange
          handling in nss/lib/ssl/ssl3con.c.
        - debian/patches/CVE-2018-12404-3.patch: add constant time
          mp_to_fixlen_octets in nss/gtests/freebl_gtest/mpi_unittest.cc,
          nss/lib/freebl/mpi/mpi.c, nss/lib/freebl/mpi/mpi.h.
        - CVE-2018-12404
    
     -- Marc Deslauriers <email address hidden>  Fri, 14 Dec 2018 10:33:50 -0500
  • nss (2:3.28.4-0ubuntu0.14.04.3) trusty-security; urgency=medium
    
      * SECURITY UPDATE: Use-after-free in TLS 1.2 generating handshake hashes
        - debian/patches/CVE-2017-7805.patch: Simplify handling of
          CertificateVerify in nss/lib/ssl/ssl3con.c, nss/lib/ssl/ssl3prot.h.
        - CVE-2017-7805
    
     -- Marc Deslauriers <email address hidden>  Fri, 29 Sep 2017 08:54:40 -0400
  • nss (2:3.28.4-0ubuntu0.14.04.2) trusty-security; urgency=medium
    
      * SECURITY UPDATE: DoS via empty SSLv2 messages
        - debian/patches/CVE-2017-7502.patch: reject broken v2 records in
          nss/lib/ssl/ssl3gthr.c, nss/lib/ssl/ssldef.c, nss/lib/ssl/sslimpl.h,
          added tests to nss/gtests/ssl_gtest/ssl_gather_unittest.cc,
          nss/gtests/ssl_gtest/ssl_gtest.gyp, nss/gtests/ssl_gtest/manifest.mn,
          nss/gtests/ssl_gtest/ssl_v2_client_hello_unittest.cc.
        - CVE-2017-7502
    
     -- Marc Deslauriers <email address hidden>  Fri, 16 Jun 2017 08:14:11 -0400
  • nss (2:3.28.4-0ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * Updated to upstream 3.28.4 to fix security issues and get a new CA
        certificate bundle.
      * SECURITY UPDATE: DES and Triple DES ciphers birthday attack
        - CVE-2016-2183
      * SECURITY UPDATE: out-of-bounds write in Base64 decoding
        - CVE-2017-5461
      * debian/patches/99_jarfile_ftbfs.patch: removed, upstream.
      * debian/patches/*.patch: refreshed for new version.
      * debian/control: bump libnspr4-dev to 4.13.1.
      * debian/libnss3.symbols: added new symbols.
    
     -- Marc Deslauriers <email address hidden>  Wed, 26 Apr 2017 10:25:43 -0400
  • nss (2:3.26.2-0ubuntu0.14.04.3) trusty-security; urgency=medium
    
      * Updated to upstream 3.26.2 to fix security issues and get a new CA
        certificate bundle.
      * SECURITY UPDATE: denial of service via invalid DH keys
        - CVE-2016-5285
      * SECURITY UPDATE: small subgroup confinement attack
        - CVE-2016-8635
      * SECURITY UPDATE: insufficient mitigation of timing side-channel attack
        - CVE-2016-9074
      * debian/rules: added libfreeblpriv3.so.
      * debian/libnss3.symbols: updated for new version, added
        SSL_GetCipherSuiteInfo and SSL_GetChannelInfo as they are not backwards
        compatible.
      * debian/patches/*.patch: refreshed for new version.
      * debian/rules: When building with -O3, build with -Wno-error=maybe-
        uninitialized to fix FTBFS on ppc64el.
      * debian/patches/99_jarfile_ftbfs.patch: fix FTBFS on powerpc.
    
     -- Marc Deslauriers <email address hidden>  Mon, 05 Dec 2016 07:19:11 -0500
  • nss (2:3.23-0ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * Updated to upstream 3.23 to fix a security issue and get a new CA
        certificate bundle.
      * SECURITY UPDATE: multiple memory safety issues
        - CVE-2016-2834
      * debian/control: bump libnspr4-dev Build-Depends to 2:4.12.
      * debian/libnss3.symbols: updated for new version.
      * debian/patches/CVE-2016-1950.patch: dropped, upstream.
      * debian/patches/ftbfs_ppc64el.patch: dropped, no longer needed.
      * debian/patches/relax_dh_size.patch: removed, now require a minimum DH
        size of 1023 bits.
      * debian/patches/*.patch: refreshed for new version.
    
     -- Marc Deslauriers <email address hidden>  Thu, 07 Jul 2016 14:09:52 -0400
  • nss (2:3.21-0ubuntu0.14.04.2) trusty-security; urgency=medium
    
      * SECURITY UPDATE: buffer overflow during ASN.1 decoding
        - debian/patches/CVE-2016-1950.patch: check lengths in
          nss/lib/util/secasn1d.c.
        - CVE-2016-1950
    
     -- Marc Deslauriers <email address hidden>  Wed, 09 Mar 2016 07:38:11 -0500
  • nss (2:3.21-0ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * Updated to upstream 3.21 to fix a security issue and get a new CA
        certificate bundle.
      * SECURITY UPDATE: improper division in mp_div and mp_exptmod
        - CVE-2016-1938
      * debian/libnss3.symbols: updated for new version.
      * debian/patches/95_add_spi+cacert_ca_certs.patch: dropped, no longer
        want the SPI cert
      * debian/patches/97_SSL_RENEGOTIATE_TRANSITIONAL.patch: dropped, no
        longer needed
      * debian/patches/CVE-2015-7575.patch: dropped, upstream
      * debian/patches/ftbfs_ppc64el.patch: don't enable -Werror on ppc64el,
        there are too many uninitialized variable false positives.
    
     -- Marc Deslauriers <email address hidden>  Thu, 04 Feb 2016 09:38:27 -0500
  • nss (2:3.19.2.1-0ubuntu0.14.04.2) trusty-security; urgency=medium
    
      * SECURITY UPDATE: incorrect MD5 support with TLS 1.2
        - debian/patches/CVE-2015-7575.patch: remove MD5 in
          nss/lib/ssl/ssl3con.c.
        - CVE-2015-7575
    
     -- Marc Deslauriers <email address hidden>  Thu, 07 Jan 2016 13:23:37 -0500
  • nss (2:3.19.2.1-0ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * Updated to upstream 3.19.2.1 to fix two security issues.
      * SECURITY UPDATE: use-after-poison in sec_asn1d_parse_leaf
        - CVE-2015-7181
      * SECURITY UPDATE: ASN.1 decoder heap overflow
        - CVE-2015-7182
    
     -- Marc Deslauriers <email address hidden>  Wed, 04 Nov 2015 10:44:42 -0600
  • nss (2:3.19.2-0ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: update to upstream 3.19.2 to fix multiple security
        issues and get a new CA certificate bundle.
        - CVE-2015-2721
        - CVE-2015-2730
      * debian/libnss3.symbols: updated for new version.
      * debian/patches/relax_dh_size.patch: relax minimum DH size to 768 bits
        for compatibility reasons. This patch will get reverted in the future
        once servers have upgraded to longer DH sizes.
    
     -- Marc Deslauriers <email address hidden>  Wed, 08 Jul 2015 12:27:02 -0400
  • nss (2:3.17.4-0ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: update to upstream 3.17.4 to get new CA certificate
        bundle, and to fix incorrect SHA-1 behaviour. (LP: #1423031)
      * Removed unneeded patches:
        - debian/patches/CVE-2014-1569.patch: included upstream.
     -- Marc Deslauriers <email address hidden>   Thu, 19 Feb 2015 07:44:05 -0500
  • nss (2:3.17.1-0ubuntu0.14.04.2) trusty-security; urgency=medium
    
      * SECURITY UPDATE: arbitrary data smuggling via incorrect ASN.1 DER
        length decoding
        - debian/patches/CVE-2014-1569.patch: properly validate lengths in
          nss/lib/util/quickder.c.
        - CVE-2014-1569
     -- Marc Deslauriers <email address hidden>   Tue, 06 Jan 2015 13:19:26 -0500
  • nss (2:3.17.1-0ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: update to 3.17.1
        - see USN-2361-1
      * debian/libnss3.symbols: updated for new version.
      * debian/patches/38_ppc64le.patch: removed, upstream.
     -- Marc Deslauriers <email address hidden>   Wed, 24 Sep 2014 07:32:00 -0400
  • nss (2:3.17-0ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: update to upstream 3.17 to get new CA certificate
        bundle.
      * Removed unneeded patches:
        - debian/patches/38_x32.patch: included upstream.
        - debian/patches/CVE-2014-1492.patch: included upstream.
        - debian/patches/CVE-2014-1544.patch: included upstream.
      * Refreshed patches for new version:
        - debian/patches/38_kbsd.patch
        - debian/patches/85_security_load.patch
        - renamed debian/patches/95_add_spi_certs.patch to
          debian/patches/95_add_spi+cacert_ca_certs.patch to match Debian.
      * debian/patches/38_ppc64le.patch: new patch for ppc64le support.
      * debian/libnss3.symbols: updated for new version.
      * debian/rules: USE_X32 instead of USE_x32.
     -- Marc Deslauriers <email address hidden>   Fri, 19 Sep 2014 09:06:41 -0400
  • nss (2:3.15.4-1ubuntu7.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: possible arbitrary code execution via race condition
        - debian/patches/CVE-2014-1544.patch: prevent
          nssTrustDomain_AddCertsToCache from freeing the CERTCertificate
          associated with the NSSCertificate in nss/lib/pk11wrap/pk11cert.c.
        - CVE-2014-1544
     -- Marc Deslauriers <email address hidden>   Tue, 09 Sep 2014 07:49:06 -0400
  • nss (2:3.15.4-1ubuntu7) trusty; urgency=medium
    
      * SECURITY UPDATE: incorrect IDNA wildcard handling
        - debian/patches/CVE-2014-1492.patch: conform to RFC 6125 in
          nss/lib/certdb/certdb.c.
        - CVE-2014-1492
     -- Marc Deslauriers <email address hidden>   Wed, 02 Apr 2014 10:14:01 -0400
  • nss (2:3.15.4-1ubuntu6) trusty; urgency=medium
    
      * No longer ship cacert.org certificates. (LP: #1258286)
        - removed debian/patches/95_add_spi+cacert_ca_certs.patch
        - added debian/patches/95_add_spi_certs.patch
     -- Marc Deslauriers <email address hidden>   Thu, 20 Feb 2014 07:38:51 -0500
  • nss (2:3.15.4-1ubuntu5) trusty; urgency=medium
    
      * debian/rules: Switch from DEB_BUILD_ARCH to DEB_HOST_ARCH to fix cross.
     -- Adam Conrad <email address hidden>   Sat, 25 Jan 2014 21:08:34 -0700
  • nss (2:3.15.4-1ubuntu4) trusty; urgency=medium
    
      * control: Mark libnss3-nssdb as M-A: foreign. (LP: #1272292)
     -- Timo Aaltonen <email address hidden>   Fri, 24 Jan 2014 14:13:10 +0200
  • nss (2:3.15.4-1ubuntu3) trusty; urgency=medium
    
      * debian/rules: create directory before creating cert database to fix
        ftbfs
     -- Marc Deslauriers <email address hidden>   Thu, 23 Jan 2014 13:22:01 -0500
  • nss (2:3.15.4-1ubuntu2) trusty; urgency=medium
    
      * debian/rules: switch back to DEB_BUILD_ARCH to fix ftbfs
     -- Marc Deslauriers <email address hidden>   Thu, 23 Jan 2014 12:39:23 -0500
  • nss (2:3.15.4-1ubuntu1) trusty; urgency=medium
    
      * Merge with Debian, remaining changes:
        - Add x32 support.
    
    nss (2:3.15.4-1) unstable; urgency=low
    
      * New upstream release.
      * Acknowledge NMU.
      * debian/rules: Avoid long one-liner with semi-colons.
      * debian/patches/*:  Refresh patches.
      * debian/copyright: Update. Closes: #730428.
      * debian/control, debian/libnss3-nssdb.*, debian/pkcs11.txt, debian/rules:
        Add shared cert and key databases. Thanks Timo Aaltonen. Closes: #537866.
      * debian/rules: Use DEB_HOST_ARCH instead of DEB_BUILD_ARCH.
      * debian/control: Mark libnss3-dev as Multi-Arch: same. Thanks Shawn
        Landden. Closes: #682925.
      * debian/libnss3.symbols: Add NSS_3.15.4 symbol versions.
     -- Marc Deslauriers <email address hidden>   Thu, 23 Jan 2014 11:32:47 -0500
  • nss (2:3.15.3.1-1.1ubuntu1) trusty; urgency=medium
    
      * Add x32 support. Closes: #699217.
     -- Matthias Klose <email address hidden>   Mon, 06 Jan 2014 21:27:26 +0100
  • nss (2:3.15.3.1-1.1) unstable; urgency=low
    
    
      * Non-Maintainer Upload
       - ship extra NSS utilities (Closes: #701141)
    
     -- Daniel Kahn Gillmor <email address hidden>  Sat, 04 Jan 2014 11:34:41 -0500
  • nss (2:3.15.3.1-1) unstable; urgency=high
    
    
      * New upstream release.
        - Distrusts AC DG Tresor SSL CA.
    
     -- Mike Hommey <email address hidden>  Sun, 15 Dec 2013 10:09:48 +0900
  • nss (2:3.15.3-1) unstable; urgency=high
    
    
      * New upstream release.
        - Fixes CVE-2013-1741, CVE-2013-5605, CVE-2013-5606.
    
     -- Mike Hommey <email address hidden>  Sat, 16 Nov 2013 08:50:45 +0900
  • nss (2:3.15.2-1) unstable; urgency=low
    
    
      * New upstream release.
        - Fixes CVE-2013-1739. Closes: #726473.
    
     -- Mike Hommey <email address hidden>  Mon, 21 Oct 2013 08:05:24 +0900
  • nss (2:3.15.1-1ubuntu1) saucy; urgency=low
    
      * Merge from Debian unstable. FFe: (LP: #1219279)
        Remaining changes:
        - control: Change Vcs-* to XS-Debian-Vcs-*.
        - rules: Include libnssb.a and libnssckfw.a in the -dev package.
    
    nss (2:3.15.1-1) unstable; urgency=low
    
      * New upstream release.
      * debian/patches/*:  Refresh patches.
      * debian/patches/lower-dhe-priority.patch: Removed, as it was only necessary
        for Iceweasel 3.5, which is long gone.
    
    nss (2:3.15-1) unstable; urgency=low
    
      * New upstream release.
      * debian/patches/*: Refresh patches and removed unused ones.
      * debian/rules: Adjusted to the new source layout.
      * debian/libnss3.symbols: Add NSS*_3.15 symbol versions.
      * debian/control: Bump nspr build dependency.
    
    nss (2:3.14.3-1) unstable; urgency=high
    
      * New upstream release.
        - Fixes TLS timing attack (luck 13). Closes: #699888.
      * debian/libnss3.symbols: Add NSS_3.14.3 symbol version.
      * debian/control: Unbump sqlite3 build dependency, 3.14.3 lifted the need
        for sqlite 3.7.15.
     -- Marc Deslauriers <email address hidden>   Thu, 19 Sep 2013 16:07:11 -0400