{"id":"MGASA-2020-0395","summary":"Updated nss and firefox packages fix security vulnerabilities","details":"Mozilla developers and community members Jason Kratzer, Simon Giesecke,\nPhilipp, and Christian Holler reported memory safety bugs present in Firefox\nESR 78.3. Some of these bugs showed evidence of memory corruption and we\npresume that with enough effort some of these could have been exploited to\nrun arbitrary code (CVE-2020-15683).\n\nA use-after-free bug in the usersctp library was reported upstream. We assume\nthis could have led to memory corruption and a potentially exploitable crash\n(CVE-2020-15969).\n\nA flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in\nTLS 1.3. This flaw allows a remote attacker to send multiple CCS messages,\ncausing a denial of service for servers compiled with the NSS library. The\nhighest threat from this vulnerability is to system availability. This flaw\naffects NSS versions before 3.58 (CVE-2020-25648).\n","modified":"2026-04-16T04:42:38.804515314Z","published":"2020-10-24T17:51:47Z","upstream":["CVE-2020-15683","CVE-2020-15969","CVE-2020-25648"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0395.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=27460"},{"type":"WEB","url":"https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes"},{"type":"ADVISORY","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2020:4310"}],"affected":[{"package":{"name":"rootcerts","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/rootcerts?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20201021.00-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0395.json"}},{"package":{"name":"nss","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/nss?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.58.0-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0395.json"}},{"package":{"name":"firefox","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/firefox?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"78.4.0-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0395.json"}},{"package":{"name":"firefox-l10n","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/firefox-l10n?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"78.4.0-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0395.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}