Описание
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | nss | Out of support scope | ||
| Red Hat Enterprise Linux 6 | nss | Out of support scope | ||
| Red Hat Enterprise Linux 7 | nspr | Fixed | RHSA-2020:4076 | 29.09.2020 |
| Red Hat Enterprise Linux 7 | nss | Fixed | RHSA-2020:4076 | 29.09.2020 |
| Red Hat Enterprise Linux 7 | nss-softokn | Fixed | RHSA-2020:4076 | 29.09.2020 |
| Red Hat Enterprise Linux 7 | nss-util | Fixed | RHSA-2020:4076 | 29.09.2020 |
| Red Hat Enterprise Linux 7.4 Advanced Update Support | nss-softokn | Fixed | RHSA-2021:0758 | 09.03.2021 |
| Red Hat Enterprise Linux 7.4 Telco Extended Update Support | nss-softokn | Fixed | RHSA-2021:0758 | 09.03.2021 |
| Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions | nss-softokn | Fixed | RHSA-2021:0758 | 09.03.2021 |
| Red Hat Enterprise Linux 7.6 Extended Update Support | nss | Fixed | RHSA-2021:0876 | 16.03.2021 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.4 High
CVSS3
Связанные уязвимости
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20 it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS i ...
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
EPSS
7.4 High
CVSS3