Vulnerability from csaf_suse
Published
2021-09-30 08:45
Modified
2021-09-30 08:45
Summary
Recommended update for mozilla-nspr, mozilla-nss
Notes
Title of the patch
Recommended update for mozilla-nspr, mozilla-nss
Description of the patch
This update for mozilla-nspr fixes the following issues:
mozilla-nspr was updated to version 4.32:
* implement new socket option PR_SockOpt_DontFrag
* support larger DNS records by increasing the default buffer
size for DNS queries
* Lock access to PRCallOnceType members in PR_CallOnce* for
thread safety bmo#1686138
* PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get
information about the operating system build version.
Mozilla NSS was updated to version 3.68:
* bmo#1713562 - Fix test leak.
* bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
* bmo#1693206 - Implement PKCS8 export of ECDSA keys.
* bmo#1712883 - DTLS 1.3 draft-43.
* bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
* bmo#1713562 - Validate ECH public names.
* bmo#1717610 - Add function to get seconds from epoch from pkix::Time.
update to NSS 3.67
* bmo#1683710 - Add a means to disable ALPN.
* bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).
* bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.
* bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.
* bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.
update to NSS 3.66
* bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.
* bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.
* bmo#1708307 - Remove Trustis FPS Root CA from NSS.
* bmo#1707097 - Add Certum Trusted Root CA to NSS.
* bmo#1707097 - Add Certum EC-384 CA to NSS.
* bmo#1703942 - Add ANF Secure Server Root CA to NSS.
* bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.
* bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.
* bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.
* bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.
* bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.
* bmo#1709291 - Add VerifyCodeSigningCertificateChain.
update to NSS 3.65
* bmo#1709654 - Update for NetBSD configuration.
* bmo#1709750 - Disable HPKE test when fuzzing.
* bmo#1566124 - Optimize AES-GCM for ppc64le.
* bmo#1699021 - Add AES-256-GCM to HPKE.
* bmo#1698419 - ECH -10 updates.
* bmo#1692930 - Update HPKE to final version.
* bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
* bmo#1703936 - New coverity/cpp scanner errors.
* bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
* bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
* bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.
update to NSS 3.64
* bmo#1705286 - Properly detect mips64.
* bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and
disable_crypto_vsx.
* bmo#1698320 - replace __builtin_cpu_supports('vsx') with
ppc_crypto_support() for clang.
* bmo#1613235 - Add POWER ChaCha20 stream cipher vector
acceleration.
Fixed in 3.63
* bmo#1697380 - Make a clang-format run on top of helpful contributions.
* bmo#1683520 - ECCKiila P384, change syntax of nested structs
initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
scalar multiplication.
* bmo#1683520 - ECCKiila P521, change syntax of nested structs
initialization to prevent build isses with GCC 4.8.
* bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
scalar multiplication.
* bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
* bmo#1694214 - tstclnt can't enable middlebox compat mode.
* bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
profiles.
* bmo#1685880 - Minor fix to prevent unused variable on early return.
* bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
with nss build.
* bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
of root CA changes, CA list version 2.48.
* bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
'Chambers of Commerce' and 'Global Chambersign' roots.
* bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
* bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
* bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
* bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
from NSS.
* bmo#1687822 - Turn off Websites trust bit for the “Staat der
Nederlanden Root CA - G3” root cert in NSS.
* bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
Root - 2008' and 'Global Chambersign Root - 2008’.
* bmo#1694291 - Tracing fixes for ECH.
update to NSS 3.62
* bmo#1688374 - Fix parallel build NSS-3.61 with make
* bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()
can corrupt 'cachedCertTable'
* bmo#1690583 - Fix CH padding extension size calculation
* bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
* bmo#1690421 - Install packaged libabigail in docker-builds image
* bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
* bmo#1674819 - Fixup a51fae403328, enum type may be signed
* bmo#1681585 - Add ECH support to selfserv
* bmo#1681585 - Update ECH to Draft-09
* bmo#1678398 - Add Export/Import functions for HPKE context
* bmo#1678398 - Update HPKE to draft-07
update to NSS 3.61
* bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
values under certain conditions.
* bmo#1684300 - Fix default PBE iteration count when NSS is compiled
with NSS_DISABLE_DBM.
* bmo#1651411 - Improve constant-timeness in RSA operations.
* bmo#1677207 - Upgrade Google Test version to latest release.
* bmo#1654332 - Add aarch64-make target to nss-try.
Update to NSS 3.60.1:
Notable changes in NSS 3.60:
* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support
has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)
implementation. See bmo#1654332 for more information.
* December 2020 batch of Root CA changes, builtins library updated
to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769
for more information.
Update to NSS 3.59.1:
* bmo#1679290 - Fix potential deadlock with certain third-party
PKCS11 modules
Update to NSS 3.59:
Notable changes:
* Exported two existing functions from libnss:
CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData
Bugfixes
* bmo#1607449 - Lock cert->nssCertificate to prevent a potential data race
* bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
* bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
* bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
* bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed
root certs when SHA1 signatures are disabled.
* bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
solve some test intermittents
* bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
our CVE-2020-25648 fix that broke purple-discord
(boo#1179382)
* bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
* bmo#1667989 - Fix gyp linking on Solaris
* bmo#1668123 - Export CERT_AddCertToListHeadWithData and
CERT_AddCertToListTailWithData from libnss
* bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
* bmo#1663091 - Remove unnecessary assertions in the streaming
ASN.1 decoder that affected decoding certain PKCS8
private keys when using NSS debug builds
* bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.
update to NSS 3.58
Bugs fixed:
* bmo#1641480 (CVE-2020-25648)
Tighten CCS handling for middlebox compatibility mode.
* bmo#1631890 - Add support for Hybrid Public Key Encryption
(draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello
(draft-ietf-tls-esni).
* bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto
extensions.
* bmo#1668328 - Handle spaces in the Python path name when using
gyp on Windows.
* bmo#1667153 - Add PK11_ImportDataKey for data object import.
* bmo#1665715 - Pass the embedded SCT list extension (if present)
to TrustDomain::CheckRevocation instead of the notBefore value.
update to NSS 3.57
* The following CA certificates were Added:
bmo#1663049 - CN=Trustwave Global Certification Authority
SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8
bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority
SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4
bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority
SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
* The following CA certificates were Removed:
bmo#1651211 - CN=EE Certification Centre Root CA
SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76
bmo#1656077 - O=Government Root Certification Authority; C=TW
SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
* Trust settings for the following CA certificates were Modified:
bmo#1653092 - CN=OISTE WISeKey Global Root GA CA
Websites (server authentication) trust bit removed.
* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes
update to NSS 3.56
Notable changes
* bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
* bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
* bmo#1654142 - Add CPU feature detection for Intel SHA extension.
* bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
* bmo#1656986 - Properly detect arm64 during GYP build architecture
detection.
* bmo#1652729 - Add build flag to disable RC2 and relocate to
lib/freebl/deprecated.
* bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
* bmo#1588941 - Send empty certificate message when scheme selection
fails.
* bmo#1652032 - Fix failure to build in Windows arm64 makefile
cross-compilation.
* bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
* bmo#1653975 - Fix 3.53 regression by setting 'all' as the default
makefile target.
* bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
* bmo#1659814 - Fix interop.sh failures with newer tls-interop
commit and dependencies.
* bmo#1656519 - NSPR dependency updated to 4.28
update to NSS 3.55
Notable changes
* P384 and P521 elliptic curve implementations are replaced with
verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
* PK11_FindCertInSlot is added. With this function, a given slot
can be queried with a DER-Encoded certificate, providing performance
and usability improvements over other mechanisms. (bmo#1649633)
* DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)
Relevant Bugfixes
* bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and
P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
* bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
* bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.
* bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part
ChaCha20 (which was not functioning correctly) and more strictly
enforce tag length.
* bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
* bmo#1653202 - Fix initialization bug in blapitest when compiled
with NSS_DISABLE_DEPRECATED_SEED.
* bmo#1646594 - Fix AVX2 detection in makefile builds.
* bmo#1649633 - Add PK11_FindCertInSlot to search a given slot
for a DER-encoded certificate.
* bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
* bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
* bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
* bmo#1649226 - Add Wycheproof ECDSA tests.
* bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
* bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in
RSA_CheckSignRecover.
* bmo#1646324 - Advertise PKCS#1 schemes for certificates in the
signature_algorithms extension.
update to NSS 3.54
Notable changes
* Support for TLS 1.3 external pre-shared keys (bmo#1603042).
* Use ARM Cryptography Extension for SHA256, when available
(bmo#1528113)
* The following CA certificates were Added:
bmo#1645186 - certSIGN Root CA G2.
bmo#1645174 - e-Szigno Root CA 2017.
bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.
bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
* The following CA certificates were Removed:
bmo#1645199 - AddTrust Class 1 CA Root.
bmo#1645199 - AddTrust External CA Root.
bmo#1641718 - LuxTrust Global Root 2.
bmo#1639987 - Staat der Nederlanden Root CA - G2.
bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.
bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.
bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.
* A number of certificates had their Email trust bit disabled.
See bmo#1618402 for a complete list.
Bugs fixed
* bmo#1528113 - Use ARM Cryptography Extension for SHA256.
* bmo#1603042 - Add TLS 1.3 external PSK support.
* bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
* bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.
* bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.
* bmo#1641716 - Add Microsoft's non-EV root certificates.
* bmo1621151 - Disable email trust bit for 'O=Government
Root Certification Authority; C=TW' root.
* bmo#1645199 - Remove AddTrust root certificates.
* bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.
* bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root
certificate.
* bmo#1618402 - Remove Symantec root certificates and disable email trust
bit.
* bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
* bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
* bmo#1642153 - Fix infinite recursion building NSS.
* bmo#1642638 - Fix fuzzing assertion crash.
* bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
* bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
* bmo#1643557 - Fix numerous compile warnings in NSS.
* bmo#1644774 - SSL gtests to use ClearServerCache when resetting
self-encrypt keys.
* bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
* bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.
Patchnames
sleposp3-mozilla-nss-nspr-91esr-14818,slessp4-mozilla-nss-nspr-91esr-14818
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Recommended update for mozilla-nspr, mozilla-nss", title: "Title of the patch", }, { category: "description", text: "This update for mozilla-nspr fixes the following issues:\n\nmozilla-nspr was updated to version 4.32:\n\n* implement new socket option PR_SockOpt_DontFrag\n* support larger DNS records by increasing the default buffer\n size for DNS queries \n* Lock access to PRCallOnceType members in PR_CallOnce* for\n thread safety bmo#1686138\n* PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get\n information about the operating system build version.\n\n\nMozilla NSS was updated to version 3.68:\n\n* bmo#1713562 - Fix test leak.\n* bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.\n* bmo#1693206 - Implement PKCS8 export of ECDSA keys.\n* bmo#1712883 - DTLS 1.3 draft-43.\n* bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.\n* bmo#1713562 - Validate ECH public names.\n* bmo#1717610 - Add function to get seconds from epoch from pkix::Time.\n\nupdate to NSS 3.67\n\n* bmo#1683710 - Add a means to disable ALPN.\n* bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).\n* bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.\n* bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.\n* bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.\n\nupdate to NSS 3.66\n\n* bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.\n* bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.\n* bmo#1708307 - Remove Trustis FPS Root CA from NSS.\n* bmo#1707097 - Add Certum Trusted Root CA to NSS.\n* bmo#1707097 - Add Certum EC-384 CA to NSS.\n* bmo#1703942 - Add ANF Secure Server Root CA to NSS.\n* bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.\n* bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.\n* bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.\n* bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.\n* bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.\n* bmo#1709291 - Add VerifyCodeSigningCertificateChain.\n\nupdate to NSS 3.65\n\n* bmo#1709654 - Update for NetBSD configuration.\n* bmo#1709750 - Disable HPKE test when fuzzing.\n* bmo#1566124 - Optimize AES-GCM for ppc64le.\n* bmo#1699021 - Add AES-256-GCM to HPKE.\n* bmo#1698419 - ECH -10 updates.\n* bmo#1692930 - Update HPKE to final version.\n* bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.\n* bmo#1703936 - New coverity/cpp scanner errors.\n* bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.\n* bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.\n* bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.\n\nupdate to NSS 3.64\n\n* bmo#1705286 - Properly detect mips64.\n* bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and\n\t\tdisable_crypto_vsx.\n* bmo#1698320 - replace __builtin_cpu_supports('vsx') with\n\t\tppc_crypto_support() for clang.\n* bmo#1613235 - Add POWER ChaCha20 stream cipher vector\n\t\tacceleration.\n\nFixed in 3.63\n\n* bmo#1697380 - Make a clang-format run on top of helpful contributions.\n* bmo#1683520 - ECCKiila P384, change syntax of nested structs\n\t\tinitialization to prevent build isses with GCC 4.8.\n* bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual\n\t\tscalar multiplication.\n* bmo#1683520 - ECCKiila P521, change syntax of nested structs\n\t\tinitialization to prevent build isses with GCC 4.8.\n* bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual\n\t\tscalar multiplication.\n* bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.\n* bmo#1694214 - tstclnt can't enable middlebox compat mode.\n* bmo#1694392 - NSS does not work with PKCS #11 modules not supporting\n\t\tprofiles.\n* bmo#1685880 - Minor fix to prevent unused variable on early return.\n* bmo#1685880 - Fix for the gcc compiler version 7 to support setenv\n\t\twith nss build.\n* bmo#1693217 - Increase nssckbi.h version number for March 2021 batch\n\t\tof root CA changes, CA list version 2.48.\n* bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's\n\t\t'Chambers of Commerce' and 'Global Chambersign' roots.\n* bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.\n* bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.\n* bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.\n* bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs\n\t\tfrom NSS.\n* bmo#1687822 - Turn off Websites trust bit for the “Staat der\n\t\tNederlanden Root CA - G3” root cert in NSS.\n* bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce\n\t\tRoot - 2008' and 'Global Chambersign Root - 2008’.\n* bmo#1694291 - Tracing fixes for ECH.\n\nupdate to NSS 3.62\n\n* bmo#1688374 - Fix parallel build NSS-3.61 with make\n* bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()\n\t\tcan corrupt 'cachedCertTable'\n* bmo#1690583 - Fix CH padding extension size calculation\n* bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail\n* bmo#1690421 - Install packaged libabigail in docker-builds image\n* bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing\n* bmo#1674819 - Fixup a51fae403328, enum type may be signed\n* bmo#1681585 - Add ECH support to selfserv\n* bmo#1681585 - Update ECH to Draft-09\n* bmo#1678398 - Add Export/Import functions for HPKE context\n* bmo#1678398 - Update HPKE to draft-07\n\nupdate to NSS 3.61\n\n* bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key\n\t\tvalues under certain conditions.\n* bmo#1684300 - Fix default PBE iteration count when NSS is compiled\n\t\twith NSS_DISABLE_DBM.\n* bmo#1651411 - Improve constant-timeness in RSA operations.\n* bmo#1677207 - Upgrade Google Test version to latest release.\n* bmo#1654332 - Add aarch64-make target to nss-try.\n\nUpdate to NSS 3.60.1:\n\nNotable changes in NSS 3.60:\n* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support\n has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)\n implementation. See bmo#1654332 for more information.\n* December 2020 batch of Root CA changes, builtins library updated\n to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769\n for more information.\n\nUpdate to NSS 3.59.1:\n\n* bmo#1679290 - Fix potential deadlock with certain third-party\n\t\tPKCS11 modules\n\nUpdate to NSS 3.59:\n\nNotable changes:\n\n* Exported two existing functions from libnss:\n CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData\n\nBugfixes\n\n* bmo#1607449 - Lock cert->nssCertificate to prevent a potential data race\n* bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA\n* bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent\n* bmo#1670835 - Support enabling and disabling signatures via Crypto Policy\n* bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed\n\t\troot certs when SHA1 signatures are disabled.\n* bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to\n\t\tsolve some test intermittents\n* bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in\n\t\tour CVE-2020-25648 fix that broke purple-discord\n\t\t(boo#1179382)\n* bmo#1666891 - Support key wrap/unwrap with RSA-OAEP\n* bmo#1667989 - Fix gyp linking on Solaris\n* bmo#1668123 - Export CERT_AddCertToListHeadWithData and\n\t\tCERT_AddCertToListTailWithData from libnss\n* bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA\n* bmo#1663091 - Remove unnecessary assertions in the streaming\n\t\tASN.1 decoder that affected decoding certain PKCS8\n\t\tprivate keys when using NSS debug builds\n* bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.\n\nupdate to NSS 3.58\n\nBugs fixed:\n\n* bmo#1641480 (CVE-2020-25648)\n Tighten CCS handling for middlebox compatibility mode.\n* bmo#1631890 - Add support for Hybrid Public Key Encryption\n (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello\n (draft-ietf-tls-esni).\n* bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto\n extensions.\n* bmo#1668328 - Handle spaces in the Python path name when using\n gyp on Windows.\n* bmo#1667153 - Add PK11_ImportDataKey for data object import.\n* bmo#1665715 - Pass the embedded SCT list extension (if present)\n to TrustDomain::CheckRevocation instead of the notBefore value.\n\nupdate to NSS 3.57\n\n* The following CA certificates were Added:\n bmo#1663049 - CN=Trustwave Global Certification Authority\n SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8\n bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority\n SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4\n bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority\n SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097\n* The following CA certificates were Removed:\n bmo#1651211 - CN=EE Certification Centre Root CA\n SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76\n bmo#1656077 - O=Government Root Certification Authority; C=TW\n SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3\n* Trust settings for the following CA certificates were Modified:\n bmo#1653092 - CN=OISTE WISeKey Global Root GA CA\n Websites (server authentication) trust bit removed.\n* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes\n\nupdate to NSS 3.56\n\nNotable changes\n\n* bmo#1650702 - Support SHA-1 HW acceleration on ARMv8\n* bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.\n* bmo#1654142 - Add CPU feature detection for Intel SHA extension.\n* bmo#1648822 - Add stricter validation of DH keys in FIPS mode.\n* bmo#1656986 - Properly detect arm64 during GYP build architecture\n\t\tdetection.\n* bmo#1652729 - Add build flag to disable RC2 and relocate to\n\t\tlib/freebl/deprecated.\n* bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.\n* bmo#1588941 - Send empty certificate message when scheme selection\n\t\tfails.\n* bmo#1652032 - Fix failure to build in Windows arm64 makefile\n\t\tcross-compilation.\n* bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.\n* bmo#1653975 - Fix 3.53 regression by setting 'all' as the default\n\t\tmakefile target.\n* bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.\n* bmo#1659814 - Fix interop.sh failures with newer tls-interop\n\t\tcommit and dependencies.\n* bmo#1656519 - NSPR dependency updated to 4.28\n\nupdate to NSS 3.55\n\nNotable changes\n* P384 and P521 elliptic curve implementations are replaced with\n verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].\n* PK11_FindCertInSlot is added. With this function, a given slot\n can be queried with a DER-Encoded certificate, providing performance\n and usability improvements over other mechanisms. (bmo#1649633)\n* DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)\n\nRelevant Bugfixes\n\n* bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and\n P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.\n* bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.\n* bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.\n* bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part\n ChaCha20 (which was not functioning correctly) and more strictly\n enforce tag length.\n* bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).\n* bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).\n* bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).\n* bmo#1653202 - Fix initialization bug in blapitest when compiled\n with NSS_DISABLE_DEPRECATED_SEED.\n* bmo#1646594 - Fix AVX2 detection in makefile builds.\n* bmo#1649633 - Add PK11_FindCertInSlot to search a given slot\n for a DER-encoded certificate.\n* bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.\n* bmo#1647752 - Update DTLS 1.3 implementation to draft-38.\n* bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.\n* bmo#1649226 - Add Wycheproof ECDSA tests.\n* bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.\n* bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in\n RSA_CheckSignRecover.\n* bmo#1646324 - Advertise PKCS#1 schemes for certificates in the\n signature_algorithms extension.\n\nupdate to NSS 3.54\n\nNotable changes\n\n* Support for TLS 1.3 external pre-shared keys (bmo#1603042).\n* Use ARM Cryptography Extension for SHA256, when available\n (bmo#1528113)\n* The following CA certificates were Added:\n bmo#1645186 - certSIGN Root CA G2.\n bmo#1645174 - e-Szigno Root CA 2017.\n bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.\n bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.\n* The following CA certificates were Removed:\n bmo#1645199 - AddTrust Class 1 CA Root.\n bmo#1645199 - AddTrust External CA Root.\n bmo#1641718 - LuxTrust Global Root 2.\n bmo#1639987 - Staat der Nederlanden Root CA - G2.\n bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.\n bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.\n bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.\n\n* A number of certificates had their Email trust bit disabled.\n See bmo#1618402 for a complete list.\n\nBugs fixed\n\n* bmo#1528113 - Use ARM Cryptography Extension for SHA256.\n* bmo#1603042 - Add TLS 1.3 external PSK support.\n* bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.\n* bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.\n* bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.\n* bmo#1641716 - Add Microsoft's non-EV root certificates.\n* bmo1621151 - Disable email trust bit for 'O=Government\n\t Root Certification Authority; C=TW' root.\n* bmo#1645199 - Remove AddTrust root certificates.\n* bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.\n* bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root\n\t\tcertificate.\n* bmo#1618402 - Remove Symantec root certificates and disable email trust\n\t\tbit.\n* bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.\n* bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.\n* bmo#1642153 - Fix infinite recursion building NSS.\n* bmo#1642638 - Fix fuzzing assertion crash.\n* bmo#1642871 - Enable SSL_SendSessionTicket after resumption.\n* bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.\n* bmo#1643557 - Fix numerous compile warnings in NSS.\n* bmo#1644774 - SSL gtests to use ClearServerCache when resetting\n\t\tself-encrypt keys.\n* bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.\n* bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.\n", title: "Description of the patch", }, { category: "details", text: "sleposp3-mozilla-nss-nspr-91esr-14818,slessp4-mozilla-nss-nspr-91esr-14818", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-ru-2021_14818-1.json", }, { category: "self", summary: "URL for SUSE-RU-2021:14818-1", url: "https://www.suse.com/support/update/announcement//suse-ru-202114818-1/", }, { category: "self", summary: "E-Mail link for SUSE-RU-2021:14818-1", url: "https://lists.suse.com/pipermail/sle-updates/2021-September/020338.html", }, { category: "self", summary: "SUSE Bug 1029961", url: "https://bugzilla.suse.com/1029961", }, { category: "self", summary: "SUSE Bug 1174697", url: "https://bugzilla.suse.com/1174697", }, { category: "self", summary: "SUSE Bug 1176206", url: "https://bugzilla.suse.com/1176206", }, { category: "self", summary: "SUSE Bug 1176934", url: "https://bugzilla.suse.com/1176934", }, { category: "self", summary: "SUSE Bug 1179382", url: "https://bugzilla.suse.com/1179382", }, { category: "self", summary: "SUSE Bug 1188891", url: "https://bugzilla.suse.com/1188891", }, { category: "self", summary: "SUSE CVE CVE-2020-12400 page", url: "https://www.suse.com/security/cve/CVE-2020-12400/", }, { category: "self", summary: "SUSE CVE CVE-2020-12401 page", url: "https://www.suse.com/security/cve/CVE-2020-12401/", }, { category: "self", summary: "SUSE CVE CVE-2020-12403 page", url: "https://www.suse.com/security/cve/CVE-2020-12403/", }, { category: "self", summary: "SUSE CVE CVE-2020-25648 page", url: "https://www.suse.com/security/cve/CVE-2020-25648/", }, { category: "self", summary: "SUSE CVE CVE-2020-6829 page", url: "https://www.suse.com/security/cve/CVE-2020-6829/", }, ], title: "Recommended update for mozilla-nspr, mozilla-nss", tracking: { current_release_date: "2021-09-30T08:45:55Z", generator: { date: "2021-09-30T08:45:55Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-RU-2021:14818-1", initial_release_date: "2021-09-30T08:45:55Z", revision_history: [ { date: "2021-09-30T08:45:55Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libfreebl3-3.68-47.16.1.i586", product: { name: "libfreebl3-3.68-47.16.1.i586", product_id: "libfreebl3-3.68-47.16.1.i586", }, }, { category: "product_version", name: "libsoftokn3-3.68-47.16.1.i586", product: { name: "libsoftokn3-3.68-47.16.1.i586", product_id: "libsoftokn3-3.68-47.16.1.i586", }, }, { category: "product_version", name: "mozilla-nspr-4.32-33.6.1.i586", product: { name: "mozilla-nspr-4.32-33.6.1.i586", product_id: "mozilla-nspr-4.32-33.6.1.i586", }, }, { category: "product_version", name: "mozilla-nss-3.68-47.16.1.i586", product: { name: "mozilla-nss-3.68-47.16.1.i586", product_id: "mozilla-nss-3.68-47.16.1.i586", }, }, { category: "product_version", name: "mozilla-nss-certs-3.68-47.16.1.i586", product: { name: "mozilla-nss-certs-3.68-47.16.1.i586", product_id: "mozilla-nss-certs-3.68-47.16.1.i586", }, }, { category: "product_version", name: "mozilla-nss-tools-3.68-47.16.1.i586", product: { name: "mozilla-nss-tools-3.68-47.16.1.i586", product_id: "mozilla-nss-tools-3.68-47.16.1.i586", }, }, { category: "product_version", name: "mozilla-nspr-devel-4.32-33.6.1.i586", product: { name: "mozilla-nspr-devel-4.32-33.6.1.i586", product_id: "mozilla-nspr-devel-4.32-33.6.1.i586", }, }, { category: "product_version", name: "mozilla-nss-devel-3.68-47.16.1.i586", product: { name: "mozilla-nss-devel-3.68-47.16.1.i586", product_id: "mozilla-nss-devel-3.68-47.16.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "libfreebl3-3.68-47.16.1.ppc64", product: { name: "libfreebl3-3.68-47.16.1.ppc64", product_id: "libfreebl3-3.68-47.16.1.ppc64", }, }, { category: "product_version", name: "libfreebl3-32bit-3.68-47.16.1.ppc64", product: { name: "libfreebl3-32bit-3.68-47.16.1.ppc64", product_id: "libfreebl3-32bit-3.68-47.16.1.ppc64", }, }, { category: "product_version", name: "libsoftokn3-3.68-47.16.1.ppc64", product: { name: "libsoftokn3-3.68-47.16.1.ppc64", product_id: "libsoftokn3-3.68-47.16.1.ppc64", }, }, { category: "product_version", name: "libsoftokn3-32bit-3.68-47.16.1.ppc64", product: { name: "libsoftokn3-32bit-3.68-47.16.1.ppc64", product_id: "libsoftokn3-32bit-3.68-47.16.1.ppc64", }, }, { category: "product_version", name: "mozilla-nspr-4.32-33.6.1.ppc64", product: { name: "mozilla-nspr-4.32-33.6.1.ppc64", product_id: "mozilla-nspr-4.32-33.6.1.ppc64", }, }, { category: "product_version", name: "mozilla-nspr-32bit-4.32-33.6.1.ppc64", product: { name: "mozilla-nspr-32bit-4.32-33.6.1.ppc64", product_id: "mozilla-nspr-32bit-4.32-33.6.1.ppc64", }, }, { category: "product_version", name: "mozilla-nspr-devel-4.32-33.6.1.ppc64", product: { name: "mozilla-nspr-devel-4.32-33.6.1.ppc64", product_id: "mozilla-nspr-devel-4.32-33.6.1.ppc64", }, }, { category: "product_version", name: "mozilla-nss-3.68-47.16.1.ppc64", product: { name: "mozilla-nss-3.68-47.16.1.ppc64", product_id: "mozilla-nss-3.68-47.16.1.ppc64", }, }, { category: "product_version", name: "mozilla-nss-32bit-3.68-47.16.1.ppc64", product: { name: "mozilla-nss-32bit-3.68-47.16.1.ppc64", product_id: "mozilla-nss-32bit-3.68-47.16.1.ppc64", }, }, { category: "product_version", name: "mozilla-nss-certs-3.68-47.16.1.ppc64", product: { name: "mozilla-nss-certs-3.68-47.16.1.ppc64", product_id: "mozilla-nss-certs-3.68-47.16.1.ppc64", }, }, { category: "product_version", name: "mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", product: { name: "mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", product_id: "mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", }, }, { category: "product_version", name: "mozilla-nss-devel-3.68-47.16.1.ppc64", product: { name: "mozilla-nss-devel-3.68-47.16.1.ppc64", product_id: "mozilla-nss-devel-3.68-47.16.1.ppc64", }, }, { category: "product_version", name: "mozilla-nss-tools-3.68-47.16.1.ppc64", product: { name: "mozilla-nss-tools-3.68-47.16.1.ppc64", product_id: "mozilla-nss-tools-3.68-47.16.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "libfreebl3-3.68-47.16.1.s390x", product: { name: "libfreebl3-3.68-47.16.1.s390x", product_id: "libfreebl3-3.68-47.16.1.s390x", }, }, { category: "product_version", name: "libfreebl3-32bit-3.68-47.16.1.s390x", product: { name: "libfreebl3-32bit-3.68-47.16.1.s390x", product_id: "libfreebl3-32bit-3.68-47.16.1.s390x", }, }, { category: "product_version", name: "libsoftokn3-3.68-47.16.1.s390x", product: { name: "libsoftokn3-3.68-47.16.1.s390x", product_id: "libsoftokn3-3.68-47.16.1.s390x", }, }, { category: "product_version", name: "libsoftokn3-32bit-3.68-47.16.1.s390x", product: { name: "libsoftokn3-32bit-3.68-47.16.1.s390x", product_id: "libsoftokn3-32bit-3.68-47.16.1.s390x", }, }, { category: "product_version", name: "mozilla-nspr-4.32-33.6.1.s390x", product: { name: "mozilla-nspr-4.32-33.6.1.s390x", product_id: "mozilla-nspr-4.32-33.6.1.s390x", }, }, { category: "product_version", name: "mozilla-nspr-32bit-4.32-33.6.1.s390x", product: { name: "mozilla-nspr-32bit-4.32-33.6.1.s390x", product_id: "mozilla-nspr-32bit-4.32-33.6.1.s390x", }, }, { category: "product_version", name: "mozilla-nspr-devel-4.32-33.6.1.s390x", product: { name: "mozilla-nspr-devel-4.32-33.6.1.s390x", product_id: "mozilla-nspr-devel-4.32-33.6.1.s390x", }, }, { category: "product_version", name: "mozilla-nss-3.68-47.16.1.s390x", product: { name: "mozilla-nss-3.68-47.16.1.s390x", product_id: "mozilla-nss-3.68-47.16.1.s390x", }, }, { category: "product_version", name: "mozilla-nss-32bit-3.68-47.16.1.s390x", product: { name: "mozilla-nss-32bit-3.68-47.16.1.s390x", product_id: "mozilla-nss-32bit-3.68-47.16.1.s390x", }, }, { category: "product_version", name: "mozilla-nss-certs-3.68-47.16.1.s390x", product: { name: "mozilla-nss-certs-3.68-47.16.1.s390x", product_id: "mozilla-nss-certs-3.68-47.16.1.s390x", }, }, { category: "product_version", name: "mozilla-nss-certs-32bit-3.68-47.16.1.s390x", product: { name: "mozilla-nss-certs-32bit-3.68-47.16.1.s390x", product_id: "mozilla-nss-certs-32bit-3.68-47.16.1.s390x", }, }, { category: "product_version", name: "mozilla-nss-devel-3.68-47.16.1.s390x", product: { name: "mozilla-nss-devel-3.68-47.16.1.s390x", product_id: "mozilla-nss-devel-3.68-47.16.1.s390x", }, }, { category: "product_version", name: "mozilla-nss-tools-3.68-47.16.1.s390x", product: { name: "mozilla-nss-tools-3.68-47.16.1.s390x", product_id: "mozilla-nss-tools-3.68-47.16.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libfreebl3-3.68-47.16.1.x86_64", product: { name: "libfreebl3-3.68-47.16.1.x86_64", product_id: "libfreebl3-3.68-47.16.1.x86_64", }, }, { category: "product_version", name: "libfreebl3-32bit-3.68-47.16.1.x86_64", product: { name: "libfreebl3-32bit-3.68-47.16.1.x86_64", product_id: "libfreebl3-32bit-3.68-47.16.1.x86_64", }, }, { category: "product_version", name: "libsoftokn3-3.68-47.16.1.x86_64", product: { name: "libsoftokn3-3.68-47.16.1.x86_64", product_id: "libsoftokn3-3.68-47.16.1.x86_64", }, }, { category: "product_version", name: "libsoftokn3-32bit-3.68-47.16.1.x86_64", product: { name: "libsoftokn3-32bit-3.68-47.16.1.x86_64", product_id: "libsoftokn3-32bit-3.68-47.16.1.x86_64", }, }, { category: "product_version", name: "mozilla-nspr-4.32-33.6.1.x86_64", product: { name: "mozilla-nspr-4.32-33.6.1.x86_64", product_id: "mozilla-nspr-4.32-33.6.1.x86_64", }, }, { category: "product_version", name: "mozilla-nspr-32bit-4.32-33.6.1.x86_64", product: { name: "mozilla-nspr-32bit-4.32-33.6.1.x86_64", product_id: "mozilla-nspr-32bit-4.32-33.6.1.x86_64", }, }, { category: "product_version", name: "mozilla-nspr-devel-4.32-33.6.1.x86_64", product: { name: "mozilla-nspr-devel-4.32-33.6.1.x86_64", product_id: "mozilla-nspr-devel-4.32-33.6.1.x86_64", }, }, { category: "product_version", name: "mozilla-nss-3.68-47.16.1.x86_64", product: { name: "mozilla-nss-3.68-47.16.1.x86_64", product_id: "mozilla-nss-3.68-47.16.1.x86_64", }, }, { category: "product_version", name: "mozilla-nss-32bit-3.68-47.16.1.x86_64", product: { name: "mozilla-nss-32bit-3.68-47.16.1.x86_64", product_id: "mozilla-nss-32bit-3.68-47.16.1.x86_64", }, }, { category: "product_version", name: "mozilla-nss-certs-3.68-47.16.1.x86_64", product: { name: "mozilla-nss-certs-3.68-47.16.1.x86_64", product_id: "mozilla-nss-certs-3.68-47.16.1.x86_64", }, }, { category: "product_version", name: "mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", product: { name: "mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", product_id: "mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", }, }, { category: "product_version", name: "mozilla-nss-devel-3.68-47.16.1.x86_64", product: { name: "mozilla-nss-devel-3.68-47.16.1.x86_64", product_id: "mozilla-nss-devel-3.68-47.16.1.x86_64", }, }, { category: "product_version", name: "mozilla-nss-tools-3.68-47.16.1.x86_64", product: { name: "mozilla-nss-tools-3.68-47.16.1.x86_64", product_id: "mozilla-nss-tools-3.68-47.16.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Point of Sale 11 SP3", product: { name: "SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-pos:11:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libfreebl3-3.68-47.16.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", }, product_reference: "libfreebl3-3.68-47.16.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "libsoftokn3-3.68-47.16.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", }, product_reference: "libsoftokn3-3.68-47.16.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "mozilla-nspr-4.32-33.6.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", }, product_reference: "mozilla-nspr-4.32-33.6.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-3.68-47.16.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", }, product_reference: "mozilla-nss-3.68-47.16.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-certs-3.68-47.16.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", }, product_reference: "mozilla-nss-certs-3.68-47.16.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-tools-3.68-47.16.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", }, product_reference: "mozilla-nss-tools-3.68-47.16.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "libfreebl3-3.68-47.16.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", }, product_reference: "libfreebl3-3.68-47.16.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreebl3-3.68-47.16.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", }, product_reference: "libfreebl3-3.68-47.16.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreebl3-3.68-47.16.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", }, product_reference: "libfreebl3-3.68-47.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreebl3-3.68-47.16.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", }, product_reference: "libfreebl3-3.68-47.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreebl3-32bit-3.68-47.16.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", }, product_reference: "libfreebl3-32bit-3.68-47.16.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreebl3-32bit-3.68-47.16.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", }, product_reference: "libfreebl3-32bit-3.68-47.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreebl3-32bit-3.68-47.16.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", }, product_reference: "libfreebl3-32bit-3.68-47.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libsoftokn3-3.68-47.16.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", }, product_reference: "libsoftokn3-3.68-47.16.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libsoftokn3-3.68-47.16.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", }, product_reference: "libsoftokn3-3.68-47.16.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libsoftokn3-3.68-47.16.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", }, product_reference: "libsoftokn3-3.68-47.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libsoftokn3-3.68-47.16.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", }, product_reference: "libsoftokn3-3.68-47.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libsoftokn3-32bit-3.68-47.16.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", }, product_reference: "libsoftokn3-32bit-3.68-47.16.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libsoftokn3-32bit-3.68-47.16.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", }, product_reference: "libsoftokn3-32bit-3.68-47.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libsoftokn3-32bit-3.68-47.16.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", }, product_reference: "libsoftokn3-32bit-3.68-47.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nspr-4.32-33.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", }, product_reference: "mozilla-nspr-4.32-33.6.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nspr-4.32-33.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", }, product_reference: "mozilla-nspr-4.32-33.6.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nspr-4.32-33.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", }, product_reference: "mozilla-nspr-4.32-33.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nspr-4.32-33.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", }, product_reference: "mozilla-nspr-4.32-33.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nspr-32bit-4.32-33.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", }, product_reference: "mozilla-nspr-32bit-4.32-33.6.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nspr-32bit-4.32-33.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", }, product_reference: "mozilla-nspr-32bit-4.32-33.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nspr-32bit-4.32-33.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", }, product_reference: "mozilla-nspr-32bit-4.32-33.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nspr-devel-4.32-33.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", }, product_reference: "mozilla-nspr-devel-4.32-33.6.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nspr-devel-4.32-33.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", }, product_reference: "mozilla-nspr-devel-4.32-33.6.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nspr-devel-4.32-33.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", }, product_reference: "mozilla-nspr-devel-4.32-33.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nspr-devel-4.32-33.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", }, product_reference: "mozilla-nspr-devel-4.32-33.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-3.68-47.16.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", }, product_reference: "mozilla-nss-3.68-47.16.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-3.68-47.16.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", }, product_reference: "mozilla-nss-3.68-47.16.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-3.68-47.16.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", }, product_reference: "mozilla-nss-3.68-47.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-3.68-47.16.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", }, product_reference: "mozilla-nss-3.68-47.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-32bit-3.68-47.16.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", }, product_reference: "mozilla-nss-32bit-3.68-47.16.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-32bit-3.68-47.16.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", }, product_reference: "mozilla-nss-32bit-3.68-47.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-32bit-3.68-47.16.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", }, product_reference: "mozilla-nss-32bit-3.68-47.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-certs-3.68-47.16.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", }, product_reference: "mozilla-nss-certs-3.68-47.16.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-certs-3.68-47.16.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", }, product_reference: "mozilla-nss-certs-3.68-47.16.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-certs-3.68-47.16.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", }, product_reference: "mozilla-nss-certs-3.68-47.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-certs-3.68-47.16.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", }, product_reference: "mozilla-nss-certs-3.68-47.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-certs-32bit-3.68-47.16.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", }, product_reference: "mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-certs-32bit-3.68-47.16.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", }, product_reference: "mozilla-nss-certs-32bit-3.68-47.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-certs-32bit-3.68-47.16.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", }, product_reference: "mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-devel-3.68-47.16.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", }, product_reference: "mozilla-nss-devel-3.68-47.16.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-devel-3.68-47.16.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", }, product_reference: "mozilla-nss-devel-3.68-47.16.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-devel-3.68-47.16.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", }, product_reference: "mozilla-nss-devel-3.68-47.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-devel-3.68-47.16.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", }, product_reference: "mozilla-nss-devel-3.68-47.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-tools-3.68-47.16.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", }, product_reference: "mozilla-nss-tools-3.68-47.16.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-tools-3.68-47.16.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", }, product_reference: "mozilla-nss-tools-3.68-47.16.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-tools-3.68-47.16.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", }, product_reference: "mozilla-nss-tools-3.68-47.16.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "mozilla-nss-tools-3.68-47.16.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", }, product_reference: "mozilla-nss-tools-3.68-47.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2020-12400", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12400", }, ], notes: [ { category: "general", text: "When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12400", url: "https://www.suse.com/security/cve/CVE-2020-12400", }, { category: "external", summary: "SUSE Bug 1174763 for CVE-2020-12400", url: "https://bugzilla.suse.com/1174763", }, { category: "external", summary: "SUSE Bug 1175686 for CVE-2020-12400", url: "https://bugzilla.suse.com/1175686", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-09-30T08:45:55Z", details: "critical", }, ], title: "CVE-2020-12400", }, { cve: "CVE-2020-12401", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12401", }, ], notes: [ { category: "general", text: "During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12401", url: "https://www.suse.com/security/cve/CVE-2020-12401", }, { category: "external", summary: "SUSE Bug 1174763 for CVE-2020-12401", url: "https://bugzilla.suse.com/1174763", }, { category: "external", summary: "SUSE Bug 1175686 for CVE-2020-12401", url: "https://bugzilla.suse.com/1175686", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-09-30T08:45:55Z", details: "critical", }, ], title: "CVE-2020-12401", }, { cve: "CVE-2020-12403", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12403", }, ], notes: [ { category: "general", text: "A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12403", url: "https://www.suse.com/security/cve/CVE-2020-12403", }, { category: "external", summary: "SUSE Bug 1174763 for CVE-2020-12403", url: "https://bugzilla.suse.com/1174763", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-09-30T08:45:55Z", details: "critical", }, ], title: "CVE-2020-12403", }, { cve: "CVE-2020-25648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25648", }, ], notes: [ { category: "general", text: "A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25648", url: "https://www.suse.com/security/cve/CVE-2020-25648", }, { category: "external", summary: "SUSE Bug 1177917 for CVE-2020-25648", url: "https://bugzilla.suse.com/1177917", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-09-30T08:45:55Z", details: "important", }, ], title: "CVE-2020-25648", }, { cve: "CVE-2020-6829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-6829", }, ], notes: [ { category: "general", text: "When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-6829", url: "https://www.suse.com/security/cve/CVE-2020-6829", }, { category: "external", summary: "SUSE Bug 1174763 for CVE-2020-6829", url: "https://bugzilla.suse.com/1174763", }, { category: "external", summary: "SUSE Bug 1175686 for CVE-2020-6829", url: "https://bugzilla.suse.com/1175686", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.32-33.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.68-47.16.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.68-47.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-09-30T08:45:55Z", details: "critical", }, ], title: "CVE-2020-6829", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.