Issue Overview:
A flaw was found in the way NSS responded to an SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. A man-in-the-middle attacker could use this flaw in a passive replay attack.(CVE-2018-12384)
Affected Packages:
nss
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update nss to update your system.
New Packages:
i686:
nss-3.36.0-7.amzn2.i686
nss-tools-3.36.0-7.amzn2.i686
nss-sysinit-3.36.0-7.amzn2.i686
nss-devel-3.36.0-7.amzn2.i686
nss-pkcs11-devel-3.36.0-7.amzn2.i686
nss-debuginfo-3.36.0-7.amzn2.i686
src:
nss-3.36.0-7.amzn2.src
x86_64:
nss-3.36.0-7.amzn2.x86_64
nss-tools-3.36.0-7.amzn2.x86_64
nss-sysinit-3.36.0-7.amzn2.x86_64
nss-devel-3.36.0-7.amzn2.x86_64
nss-pkcs11-devel-3.36.0-7.amzn2.x86_64
nss-debuginfo-3.36.0-7.amzn2.x86_64
Red Hat: CVE-2018-12384
Mitre: CVE-2018-12384
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | i686 | nss | < 3.36.0-7.amzn2 | nss-3.36.0-7.amzn2.i686.rpm |
Amazon Linux | 2 | i686 | nss-tools | < 3.36.0-7.amzn2 | nss-tools-3.36.0-7.amzn2.i686.rpm |
Amazon Linux | 2 | i686 | nss-sysinit | < 3.36.0-7.amzn2 | nss-sysinit-3.36.0-7.amzn2.i686.rpm |
Amazon Linux | 2 | i686 | nss-devel | < 3.36.0-7.amzn2 | nss-devel-3.36.0-7.amzn2.i686.rpm |
Amazon Linux | 2 | i686 | nss-pkcs11-devel | < 3.36.0-7.amzn2 | nss-pkcs11-devel-3.36.0-7.amzn2.i686.rpm |
Amazon Linux | 2 | i686 | nss-debuginfo | < 3.36.0-7.amzn2 | nss-debuginfo-3.36.0-7.amzn2.i686.rpm |
Amazon Linux | 2 | x86_64 | nss | < 3.36.0-7.amzn2 | nss-3.36.0-7.amzn2.x86_64.rpm |
Amazon Linux | 2 | x86_64 | nss-tools | < 3.36.0-7.amzn2 | nss-tools-3.36.0-7.amzn2.x86_64.rpm |
Amazon Linux | 2 | x86_64 | nss-sysinit | < 3.36.0-7.amzn2 | nss-sysinit-3.36.0-7.amzn2.x86_64.rpm |
Amazon Linux | 2 | x86_64 | nss-devel | < 3.36.0-7.amzn2 | nss-devel-3.36.0-7.amzn2.x86_64.rpm |