VYPR

rpm package

opensuse/mozilla-nss&distro=openSUSE Tumbleweed

pkg:rpm/opensuse/mozilla-nss&distro=openSUSE%20Tumbleweed

Vulnerabilities (37)

  • CVE-2023-5388Mar 19, 2024
    affected < 3.98-1.1fixed 3.98-1.1

    NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9.

  • CVE-2021-43527Dec 8, 2021
    affected < 3.73-1.1fixed 3.73-1.1

    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted.

  • CVE-2020-12403May 27, 2021
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly en

  • CVE-2020-6829Oct 28, 2020
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been com

  • CVE-2019-17006Oct 22, 2020
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.

  • CVE-2020-25648Oct 20, 2020
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system ava

  • CVE-2020-12401Oct 8, 2020
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

  • CVE-2020-12402Jul 9, 2020
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the rec

  • CVE-2020-12399Jul 9, 2020
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.

  • CVE-2019-11745Jan 8, 2020
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3,

  • CVE-2019-11719Jul 23, 2019
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68,

  • CVE-2019-11727Jul 23, 2019
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messag

  • CVE-2019-11729Jul 23, 2019
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.

  • CVE-2018-12404May 2, 2019
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.

  • CVE-2018-12384Apr 29, 2019
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.

  • CVE-2018-0495Jun 13, 2018
    affected < 3.69.1-1.2fixed 3.69.1-1.2

    Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Numbe

  • CVE-2016-2834HigJun 13, 2016
    affected < 3.26.2-1.1fixed 3.26.2-1.1

    Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.

  • CVE-2016-1979HigMar 13, 2016
    affected < 3.26.2-1.1fixed 3.26.2-1.1

    Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact v

  • CVE-2016-1950HigMar 13, 2016
    affected < 3.26.2-1.1fixed 3.26.2-1.1

    Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509

  • CVE-2015-7575MedJan 9, 2016
    affected < 3.26.2-1.1fixed 3.26.2-1.1

    Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle at

Page 1 of 2