7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.013 Low
EPSS
Percentile
85.6%
Debian LTS Advisory DLA-2388-1 [email protected]
https://www.debian.org/lts/security/ Adrian Bunk
September 29, 2020 https://wiki.debian.org/LTS
Package : nss
Version : 2:3.26.2-1.1+deb9u2
CVE ID : CVE-2018-12404 CVE-2018-18508 CVE-2019-11719 CVE-2019-11729
CVE-2019-11745 CVE-2019-17006 CVE-2019-17007 CVE-2020-6829
CVE-2020-12399 CVE-2020-12400 CVE-2020-12401 CVE-2020-12402
CVE-2020-12403
Debian Bug : 921614 961752 963152
Various vulnerabilities were fixed in nss,
the Network Security Service libraries.
CVE-2018-12404
Cache side-channel variant of the Bleichenbacher attack.
CVE-2018-18508
NULL pointer dereference in several CMS functions resulting in a
denial of service.
CVE-2019-11719
Out-of-bounds read when importing curve25519 private key.
CVE-2019-11729
Empty or malformed p256-ECDH public keys may trigger a segmentation
fault.
CVE-2019-11745
Out-of-bounds write when encrypting with a block cipher.
CVE-2019-17006
Some cryptographic primitives did not check the length of the input
text, potentially resulting in overflows.
CVE-2019-17007
Handling of Netscape Certificate Sequences may crash with a NULL
dereference leading to a denial of service.
CVE-2020-12399
Force a fixed length for DSA exponentiation.
CVE-2020-6829
CVE-2020-12400
Side channel attack on ECDSA signature generation.
CVE-2020-12401
ECDSA timing attack mitigation bypass.
CVE-2020-12402
Side channel vulnerabilities during RSA key generation.
CVE-2020-12403
CHACHA20-POLY1305 decryption with undersized tag leads to
out-of-bounds read.
For Debian 9 stretch, these problems have been fixed in version
2:3.26.2-1.1+deb9u2.
We recommend that you upgrade your nss packages.
For the detailed security status of nss please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nss
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | lightning-l10n-hy-am | < 1:60.8.0-1~deb9u1 | lightning-l10n-hy-am_1:60.8.0-1~deb9u1_all.deb |
Debian | 10 | all | lightning-l10n-si | < 1:60.8.0-1~deb10u1 | lightning-l10n-si_1:60.8.0-1~deb10u1_all.deb |
Debian | 9 | all | firefox-esr-l10n-lt | < 60.8.0esr-1~deb9u1 | firefox-esr-l10n-lt_60.8.0esr-1~deb9u1_all.deb |
Debian | 9 | all | thunderbird-l10n-ca | < 1:60.8.0-1~deb9u1 | thunderbird-l10n-ca_1:60.8.0-1~deb9u1_all.deb |
Debian | 9 | all | iceweasel-l10n-ro | < 1:60.8.0esr-1~deb9u1 | iceweasel-l10n-ro_1:60.8.0esr-1~deb9u1_all.deb |
Debian | 10 | all | lightning-l10n-sl | < 1:60.8.0-1~deb10u1 | lightning-l10n-sl_1:60.8.0-1~deb10u1_all.deb |
Debian | 9 | all | icedove-l10n-hr | < 1:60.8.0-1~deb9u1 | icedove-l10n-hr_1:60.8.0-1~deb9u1_all.deb |
Debian | 9 | all | firefox-esr-l10n-ach | < 60.8.0esr-1~deb9u1 | firefox-esr-l10n-ach_60.8.0esr-1~deb9u1_all.deb |
Debian | 9 | all | iceweasel-l10n-eu | < 1:60.8.0esr-1~deb9u1 | iceweasel-l10n-eu_1:60.8.0esr-1~deb9u1_all.deb |
Debian | 10 | mips | libnss3-dev | < 2:3.42.1-1+deb10u1 | libnss3-dev_2:3.42.1-1+deb10u1_mips.deb |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.013 Low
EPSS
Percentile
85.6%