Search for packages
Package details: pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
purl pkg:deb/debian/nss@2:3.26.2-1.1%2Bdeb9u1
Next non-vulnerable version 2:3.110-1
Latest non-vulnerable version 2:3.110-1
Risk 4.5
Vulnerabilities affecting this package (25)
Vulnerability Summary Fixed by
VCID-1xgw-uan4-byhg
Aliases:
CVE-2021-43527
NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-1zaj-dhug-bffr
Aliases:
CVE-2024-0743
An unchecked return value in TLS handshake code could have caused a potentially exploitable crash.
2:3.87.1-1+deb12u1
Affected by 3 other vulnerabilities.
VCID-54s7-rrtw-a7cg
Aliases:
CVE-2020-12402
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. We would like to thank Sohaib ul Hassan for contributing a fix for this issue as well.*Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-77de-35ta-1kat
Aliases:
CVE-2024-6609
When almost out-of-memory an elliptic curve key which was never allocated could have been freed again.
2:3.87.1-1+deb12u1
Affected by 3 other vulnerabilities.
VCID-7s8d-r67g-6feh
Aliases:
CVE-2024-6602
A mismatch between allocator and deallocator could have led to memory corruption.
2:3.87.1-1+deb12u1
Affected by 3 other vulnerabilities.
VCID-ake6-cm2x-8ubs
Aliases:
CVE-2019-11745
When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-axss-jrt6-qqdk
Aliases:
CVE-2020-25648
A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-bjhc-gzeg-vyhq
Aliases:
CVE-2019-11719
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-c5su-4v3n-5qh4
Aliases:
CVE-2020-12401
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-e8wz-a6j9-ybas
Aliases:
CVE-2020-12399
NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-ex9u-mprs-bqfe
Aliases:
CVE-2018-18508
In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
VCID-hvj7-bwkf-f3em
Aliases:
CVE-2020-6829
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-mahw-y94d-xbe6
Aliases:
CVE-2019-11729
Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-nzee-g5hm-pfca
Aliases:
CVE-2018-12384
When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
VCID-pjmh-gvqz-47et
Aliases:
CVE-2023-4421
The NSS code used for checking PKCS#1 v1.5 was leaking information useful in mounting Bleichenbacher-like attacks. Both the overall correctness of the padding as well as the length of the encrypted message was leaking through timing side-channel. By sending large number of attacker-selected ciphertexts, the attacker would be able to decrypt a previously intercepted PKCS#1 v1.5 ciphertext (for example, to decrypt a TLS session that used RSA key exchange), or forge a signature using the victim's key. The issue was fixed by implementing the implicit rejection algorithm, in which the NSS returns a deterministic random message in case invalid padding is detected, as proposed in the Marvin Attack paper.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-sm4b-5vw1-1qcf
Aliases:
CVE-2019-17023
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-sv69-65sj-vybj
Aliases:
CVE-2020-12400
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-tkkj-f8ww-1kdn
Aliases:
CVE-2020-12403
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-ubzm-vaec-93gp
Aliases:
CVE-2022-22747
After accepting an untrusted certificate, handling an empty pkcs7 sequence as part of the certificate data could have lead to a crash. This crash is believed to be unexploitable.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-vme5-mkru-k3aj
Aliases:
CVE-2019-17007
In Network Security Services before 3.44, a malformed Netscape Certificate Sequence can cause NSS to crash, resulting in a denial of service.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-w27h-8fnv-guhx
Aliases:
CVE-2019-11727
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-wqhe-hmdh-p7eq
Aliases:
CVE-2017-7805
During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
VCID-x6ny-uzze-23ap
Aliases:
CVE-2019-17006
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-yqjn-5kut-6qbk
Aliases:
CVE-2023-0767
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-z5tc-zwsb-eydp
Aliases:
CVE-2018-12404
A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-6gvr-zjz7-5uh5 An out-of-bounds write during Base64 decoding operation in the Network Security Services (NSS) library due to insufficient memory being allocated to the buffer. This results in a potentially exploitable crash. The NSS library has been updated to fix this issue to address this issue and Firefox 53 has been updated with NSS version 3.29.5. CVE-2017-5461
VCID-p65t-d156-qfex A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox 53 has been updated with NSS version 3.29.5. CVE-2017-5462
VCID-tbc7-h4xz-rkdq CVE-2017-7502
VCID-wqhe-hmdh-p7eq During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. CVE-2017-7805
VCID-zxmj-tzr9-c3cy An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1. CVE-2016-9074

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T20:15:04.818563+00:00 Debian Oval Importer Affected by VCID-wqhe-hmdh-p7eq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T20:07:27.627592+00:00 Debian Oval Importer Affected by VCID-c5su-4v3n-5qh4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:54:15.582553+00:00 Debian Oval Importer Affected by VCID-1xgw-uan4-byhg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:47:09.898210+00:00 Debian Oval Importer Affected by VCID-7s8d-r67g-6feh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:42:38.895397+00:00 Debian Oval Importer Fixing VCID-p65t-d156-qfex https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:54:18.847991+00:00 Debian Oval Importer Affected by VCID-ake6-cm2x-8ubs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:53:18.634051+00:00 Debian Oval Importer Affected by VCID-bjhc-gzeg-vyhq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:52:38.649564+00:00 Debian Oval Importer Affected by VCID-tkkj-f8ww-1kdn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:27:53.248577+00:00 Debian Oval Importer Fixing VCID-tbc7-h4xz-rkdq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:09:03.946201+00:00 Debian Oval Importer Affected by VCID-e8wz-a6j9-ybas https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:36:15.658974+00:00 Debian Oval Importer Affected by VCID-sm4b-5vw1-1qcf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:29:34.154977+00:00 Debian Oval Importer Affected by VCID-mahw-y94d-xbe6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:17:53.627677+00:00 Debian Oval Importer Affected by VCID-ubzm-vaec-93gp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:59:43.530812+00:00 Debian Oval Importer Affected by VCID-nzee-g5hm-pfca https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:53:11.892688+00:00 Debian Oval Importer Affected by VCID-1zaj-dhug-bffr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:43:48.486380+00:00 Debian Oval Importer Affected by VCID-ex9u-mprs-bqfe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:35:56.802615+00:00 Debian Oval Importer Affected by VCID-vme5-mkru-k3aj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:25:41.969442+00:00 Debian Oval Importer Fixing VCID-zxmj-tzr9-c3cy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:10:19.115527+00:00 Debian Oval Importer Affected by VCID-77de-35ta-1kat https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:00:46.452273+00:00 Debian Oval Importer Affected by VCID-z5tc-zwsb-eydp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:50:02.421867+00:00 Debian Oval Importer Fixing VCID-6gvr-zjz7-5uh5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:15:14.703795+00:00 Debian Oval Importer Affected by VCID-sv69-65sj-vybj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:56:48.319311+00:00 Debian Oval Importer Affected by VCID-hvj7-bwkf-f3em https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:50:10.004777+00:00 Debian Oval Importer Affected by VCID-yqjn-5kut-6qbk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:39:00.438023+00:00 Debian Oval Importer Affected by VCID-x6ny-uzze-23ap https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:16:55.811066+00:00 Debian Oval Importer Affected by VCID-w27h-8fnv-guhx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:04:33.906444+00:00 Debian Oval Importer Affected by VCID-54s7-rrtw-a7cg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:51:43.757936+00:00 Debian Oval Importer Affected by VCID-axss-jrt6-qqdk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:02:09.106289+00:00 Debian Oval Importer Affected by VCID-pjmh-gvqz-47et https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:42:41.488919+00:00 Debian Oval Importer Affected by VCID-vme5-mkru-k3aj https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:30:00.428897+00:00 Debian Oval Importer Affected by VCID-sm4b-5vw1-1qcf https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:26:56.415018+00:00 Debian Oval Importer Affected by VCID-x6ny-uzze-23ap https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:19:57.890245+00:00 Debian Oval Importer Affected by VCID-ake6-cm2x-8ubs https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:18:11.619609+00:00 Debian Oval Importer Affected by VCID-54s7-rrtw-a7cg https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:17:38.151205+00:00 Debian Oval Importer Affected by VCID-e8wz-a6j9-ybas https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:16:05.385158+00:00 Debian Oval Importer Affected by VCID-1xgw-uan4-byhg https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:16:01.581374+00:00 Debian Oval Importer Affected by VCID-ubzm-vaec-93gp https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T10:46:01.996134+00:00 Debian Oval Importer Fixing VCID-wqhe-hmdh-p7eq https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 37.0.0