Search for packages
purl | pkg:deb/debian/nss@2:3.87.1-1%2Bdeb12u1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-417p-mjbt-aaac
Aliases: CVE-2023-6135 |
Multiple NSS NIST curves were susceptible to a side-channel attack known as "Minerva". This attack could potentially allow an attacker to recover the private key. This vulnerability affects Firefox < 121. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-n6fw-n4rm-aaas
Aliases: CVE-2024-7531 |
Calling PK11_Encrypt() in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-ndhu-5njp-aaaa
Aliases: CVE-2023-5388 |
timing attack against RSA decryption |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-417p-mjbt-aaac | Multiple NSS NIST curves were susceptible to a side-channel attack known as "Minerva". This attack could potentially allow an attacker to recover the private key. This vulnerability affects Firefox < 121. |
CVE-2023-6135
|
VCID-au4v-jfff-aaap | When almost out-of-memory an elliptic curve key which was never allocated could have been freed again. |
CVE-2024-6609
|
VCID-frn1-3m59-aaac | new tlsfuzzer code can still detect timing issues in RSA operations |
CVE-2023-4421
|
VCID-n6fw-n4rm-aaas | Calling PK11_Encrypt() in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. |
CVE-2024-7531
|
VCID-ndhu-5njp-aaaa | timing attack against RSA decryption |
CVE-2023-5388
|
VCID-v9r1-hscs-aaac | An unchecked return value in TLS handshake code could have caused a potentially exploitable crash. |
CVE-2024-0743
|
VCID-zd7v-2uxh-aaae | A mismatch between allocator and deallocator could have lead to memory corruption. |
CVE-2024-6602
|