9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
8.7 High
AI Score
Confidence
Low
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
0.002 Low
EPSS
Percentile
61.6%
Package : nss
Version : 2:3.42.1-1+deb10u6
CVE ID : CVE-2020-6829 CVE-2020-12400 CVE-2020-12401 CVE-2020-12403
CVE-2023-0767
Multiple security vulnerabilities have been discovered in nss, the Network
Security Service libraries.
CVE-2020-6829
When performing EC scalar point multiplication, the wNAF point
multiplication algorithm was used; which leaked partial information about
the nonce used during signature generation. Given an electro-magnetic trace
of a few signature generations, the private key could have been computed.
CVE-2020-12400
When converting coordinates from projective to affine, the modular
inversion was not performed in constant time, resulting in a possible
timing-based side channel attack.
CVE-2020-12401
During ECDSA signature generation, padding applied in the nonce designed to
ensure constant-time scalar multiplication was removed, resulting in
variable-time execution dependent on secret data.
CVE-2020-12403
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS.
When using multi-part Chacha20, it could cause out-of-bounds reads.
This issue was fixed by explicitly disabling multi-part ChaCha20
(which was not functioning correctly) and strictly enforcing tag length.
CVE-2023-0767
Christian Holler discovered that incorrect handling of PKCS 12 Safe Bag
attributes may result in execution of arbitrary code if a specially crafted
PKCS 12 certificate bundle is processed.
For Debian 10 buster, these problems have been fixed in version
2:3.42.1-1+deb10u6.
We recommend that you upgrade your nss packages.
For the detailed security status of nss please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nss
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | armhf | libnss3 | < 2:3.42.1-1+deb10u6 | libnss3_2:3.42.1-1+deb10u6_armhf.deb |
Debian | 9 | i386 | libnss3-dev | < 2:3.26.2-1.1+deb9u2 | libnss3-dev_2:3.26.2-1.1+deb9u2_i386.deb |
Debian | 9 | arm64 | libnss3 | < 2:3.26.2-1.1+deb9u2 | libnss3_2:3.26.2-1.1+deb9u2_arm64.deb |
Debian | 9 | armel | libnss3 | < 2:3.26.2-1.1+deb9u2 | libnss3_2:3.26.2-1.1+deb9u2_armel.deb |
Debian | 9 | armhf | libnss3 | < 2:3.26.2-1.1+deb9u2 | libnss3_2:3.26.2-1.1+deb9u2_armhf.deb |
Debian | 9 | amd64 | libnss3-dbg | < 2:3.26.2-1.1+deb9u2 | libnss3-dbg_2:3.26.2-1.1+deb9u2_amd64.deb |
Debian | 9 | armel | libnss3-dbg | < 2:3.26.2-1.1+deb9u2 | libnss3-dbg_2:3.26.2-1.1+deb9u2_armel.deb |
Debian | 10 | i386 | libnss3 | < 2:3.42.1-1+deb10u6 | libnss3_2:3.42.1-1+deb10u6_i386.deb |
Debian | 10 | armhf | libnss3-dev | < 2:3.42.1-1+deb10u6 | libnss3-dev_2:3.42.1-1+deb10u6_armhf.deb |
Debian | 9 | i386 | libnss3 | < 2:3.26.2-1.1+deb9u2 | libnss3_2:3.26.2-1.1+deb9u2_i386.deb |
9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
8.7 High
AI Score
Confidence
Low
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
0.002 Low
EPSS
Percentile
61.6%