VYPR

rpm package

suse/mozilla-nss&distro=SUSE Linux Enterprise Point of Sale 11 SP3

pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3

Vulnerabilities (88)

  • CVE-2022-1097Dec 22, 2022
    affected < 3.68.3-47.25.1fixed 3.68.3-47.25.1

    NSSToken objects were referenced via direct points, and could have been accessed in an unsafe way on different threads, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

  • CVE-2021-43527Dec 8, 2021
    affected < 3.68.1-47.19.1fixed 3.68.1-47.19.1

    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted.

  • CVE-2020-12403May 27, 2021
    affected < 3.68-47.16.1fixed 3.68-47.16.1

    A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly en

  • CVE-2020-6829Oct 28, 2020
    affected < 3.68-47.16.1fixed 3.68-47.16.1

    When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been com

  • CVE-2020-25648Oct 20, 2020
    affected < 3.68-47.16.1fixed 3.68-47.16.1

    A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system ava

  • CVE-2020-12401Oct 8, 2020
    affected < 3.68-47.16.1fixed 3.68-47.16.1

    During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

  • CVE-2020-12400Oct 8, 2020
    affected < 3.68-47.16.1fixed 3.68-47.16.1

    When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

  • CVE-2016-5285Nov 15, 2019
    affected < 3.21.3-39.1fixed 3.21.3-39.1

    A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service.

  • CVE-2016-8635Aug 1, 2018
    affected < 3.29.5-46.1fixed 3.29.5-46.1

    It was found that Diffie Hellman Client key exchange handling in NSS 3.21.x was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group.

  • CVE-2016-9574Jul 19, 2018
    affected < 3.29.5-46.1fixed 3.29.5-46.1

    nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.

  • CVE-2017-7825Jun 11, 2018
    affected < 3.29.5-47.6.1fixed 3.29.5-47.6.1

    Several fonts on OS X display some Tibetan and Arabic characters as whitespace. When used in the addressbar as part of an IDN this can be used for domain name spoofing attacks. Note: This attack only affects OS X operating systems. Other operating systems are unaffected. This vul

  • CVE-2017-7824Jun 11, 2018
    affected < 3.29.5-47.6.1fixed 3.29.5-47.6.1

    A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. This vulnerability affects Firefo

  • CVE-2017-7823Jun 11, 2018
    affected < 3.29.5-47.6.1fixed 3.29.5-47.6.1

    The content security policy (CSP) "sandbox" directive did not create a unique origin for the document, causing it to behave as if the "allow-same-origin" keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content. This v

  • CVE-2017-7819Jun 11, 2018
    affected < 3.29.5-47.6.1fixed 3.29.5-47.6.1

    A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. This results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderb

  • CVE-2017-7818Jun 11, 2018
    affected < 3.29.5-47.6.1fixed 3.29.5-47.6.1

    A use-after-free vulnerability can occur when manipulating arrays of Accessible Rich Internet Applications (ARIA) elements within containers through the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderb

  • CVE-2017-7814Jun 11, 2018
    affected < 3.29.5-47.6.1fixed 3.29.5-47.6.1

    File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that

  • CVE-2017-7810Jun 11, 2018
    affected < 3.29.5-47.6.1fixed 3.29.5-47.6.1

    Memory safety bugs were reported in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 56, Firefox ESR <

  • CVE-2017-7805Jun 11, 2018
    affected < 3.29.5-47.6.1fixed 3.29.5-47.6.1

    During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leav

  • CVE-2017-7793Jun 11, 2018
    affected < 3.29.5-47.6.1fixed 3.29.5-47.6.1

    A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.

  • CVE-2017-7778Jun 11, 2018
    affected < 3.29.5-47.3.2fixed 3.29.5-47.3.2

    A number of security vulnerabilities in the Graphite 2 library including out-of-bounds reads, buffer overflow reads and writes, and the use of uninitialized memory. These issues were addressed in Graphite 2 version 1.3.10. This vulnerability affects Firefox < 54, Firefox ESR < 52

Page 1 of 5