Search for packages
Package details: pkg:alpm/archlinux/lib32-nss@3.73-1
purl pkg:alpm/archlinux/lib32-nss@3.73-1
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-6jzj-cgtw-aaak NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1. CVE-2021-43527

Date Actor Action Vulnerability Source VulnerableCode Version
2025-03-28T07:45:22.372422+00:00 Arch Linux Importer Fixing VCID-6jzj-cgtw-aaak https://security.archlinux.org/AVG-2597 36.0.0
2024-09-18T02:00:18.062854+00:00 Arch Linux Importer Fixing VCID-6jzj-cgtw-aaak https://security.archlinux.org/AVG-2597 34.0.1
2024-01-23T15:32:14.632629+00:00 Arch Linux Importer Fixing VCID-6jzj-cgtw-aaak https://security.archlinux.org/AVG-2597 34.0.0rc2
2024-01-03T22:26:32.866007+00:00 Arch Linux Importer Fixing VCID-6jzj-cgtw-aaak https://security.archlinux.org/AVG-2597 34.0.0rc1