VYPR

rpm package

suse/mozilla-nss&distro=SUSE Linux Enterprise Micro 5.0

pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Micro%205.0

Vulnerabilities (7)

  • CVE-2022-1097Dec 22, 2022
    affected < 3.68.3-150000.3.67.1fixed 3.68.3-150000.3.67.1

    NSSToken objects were referenced via direct points, and could have been accessed in an unsafe way on different threads, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

  • CVE-2021-43527Dec 8, 2021
    affected < 3.68.1-3.61.1fixed 3.68.1-3.61.1

    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted.

  • CVE-2020-12403May 27, 2021
    affected < 3.68-3.56.1fixed 3.68-3.56.1

    A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly en

  • CVE-2020-6829Oct 28, 2020
    affected < 3.68-3.56.1fixed 3.68-3.56.1

    When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been com

  • CVE-2020-25648Oct 20, 2020
    affected < 3.68-3.56.1fixed 3.68-3.56.1

    A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system ava

  • CVE-2020-12401Oct 8, 2020
    affected < 3.68-3.56.1fixed 3.68-3.56.1

    During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

  • CVE-2020-12400Oct 8, 2020
    affected < 3.68-3.56.1fixed 3.68-3.56.1

    When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.