Description
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2388-1 | nss security update |
Debian DLA |
DLA-3327-1 | nss security update |
EUVD |
EUVD-2020-4715 | A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability. |
Ubuntu USN |
USN-4476-1 | NSS vulnerability |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-04T11:56:51.720Z
Reserved: 2020-04-28T00:00:00.000Z
Link: CVE-2020-12403
No data.
Status : Modified
Published: 2021-05-27T19:15:07.953
Modified: 2024-11-21T04:59:38.987
Link: CVE-2020-12403
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN