Lucene search

K
debianDebianDEBIAN:DLA-3327-1:96EC7
HistoryFeb 20, 2023 - 3:16 p.m.

[SECURITY] [DLA 3327-1] nss security update

2023-02-2015:16:03
lists.debian.org
6

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

8.7 High

AI Score

Confidence

Low

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

0.002 Low

EPSS

Percentile

61.6%


Debian LTS Advisory DLA-3327-1 [email protected]
https://www.debian.org/lts/security/ Markus Koschany
February 20, 2023 https://wiki.debian.org/LTS

Package : nss
Version : 2:3.42.1-1+deb10u6
CVE ID : CVE-2020-6829 CVE-2020-12400 CVE-2020-12401 CVE-2020-12403
CVE-2023-0767

Multiple security vulnerabilities have been discovered in nss, the Network
Security Service libraries.

CVE-2020-6829

When performing EC scalar point multiplication, the wNAF point
multiplication algorithm was used; which leaked partial information about
the nonce used during signature generation. Given an electro-magnetic trace
of a few signature generations, the private key could have been computed.

CVE-2020-12400

When converting coordinates from projective to affine, the modular
inversion was not performed in constant time, resulting in a possible
timing-based side channel attack.

CVE-2020-12401

During ECDSA signature generation, padding applied in the nonce designed to
ensure constant-time scalar multiplication was removed, resulting in
variable-time execution dependent on secret data.

CVE-2020-12403

A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS.
When using multi-part Chacha20, it could cause out-of-bounds reads.
This issue was fixed by explicitly disabling multi-part ChaCha20 
(which was not functioning correctly) and strictly enforcing tag length.

CVE-2023-0767

Christian Holler discovered that incorrect handling of PKCS 12 Safe Bag
attributes may result in execution of arbitrary code if a specially crafted
PKCS 12 certificate bundle is processed.

For Debian 10 buster, these problems have been fixed in version
2:3.42.1-1+deb10u6.

We recommend that you upgrade your nss packages.

For the detailed security status of nss please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nss

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

8.7 High

AI Score

Confidence

Low

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

0.002 Low

EPSS

Percentile

61.6%