A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | nspr | 2021-07-08 18:41 | ALAS-2021-1522 |
Amazon Linux 2 - Core | nspr | 2020-11-09 21:02 | ALAS2-2020-1559 |
Amazon Linux 2 - Core | nss | 2020-11-09 21:02 | ALAS2-2020-1559 |
Amazon Linux 1 | nss-softokn | 2021-07-08 18:41 | ALAS-2021-1522 |
Amazon Linux 2 - Core | nss-softokn | 2020-11-09 21:02 | ALAS2-2020-1559 |
Amazon Linux 1 | nss-util | 2021-07-08 18:41 | ALAS-2021-1522 |
Amazon Linux 2 - Core | nss-util | 2020-11-09 21:02 | ALAS2-2020-1559 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.4 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H |
NVD | CVSSv2 | 6.4 | AV:N/AC:L/Au:N/C:P/I:N/A:P |
NVD | CVSSv3 | 9.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |