Name | CVE-2019-11727 |
Description | A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
firefox (PTS) | sid | 132.0.2-1 | fixed |
nss (PTS) | jessie, jessie (lts) | 2:3.26-1+debu8u19 | vulnerable |
| stretch (security) | 2:3.26.2-1.1+deb9u5 | vulnerable |
| stretch (lts), stretch | 2:3.26.2-1.1+deb9u8 | vulnerable |
| buster, buster (lts) | 2:3.42.1-1+deb10u9 | fixed |
| buster (security) | 2:3.42.1-1+deb10u8 | fixed |
| bullseye | 2:3.61-1+deb11u3 | fixed |
| bullseye (security) | 2:3.61-1+deb11u4 | fixed |
| bookworm | 2:3.87.1-1 | fixed |
| bookworm (security) | 2:3.87.1-1+deb12u1 | fixed |
| trixie | 2:3.105-2 | fixed |
| sid | 2:3.106-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
firefox | source | (unstable) | 68.0-1 | unimportant | | |
nss | source | buster | 2:3.42.1-1+deb10u1 | | | |
nss | source | (unstable) | 2:3.45-1 | | | |
Notes
[stretch] - nss <ignored> (Issue is specific to TLS 1.3 and support was not really complete in 3.26; code has diverged significantly since and applying the fix would be very disruptive)
[jessie] - nss <ignored> (Issue is specific to TLS 1.3 and support was not really complete in 3.26; code has diverged significantly since and applying the fix would be very disruptive)
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://hg.mozilla.org/projects/nss/rev/0a4e8b72a92e144663c2f35d3836f7828cfc97f2
firefox-esr in older suites than buster use the embedded copy and thus issue
is just fixed by updating firefox-esr to 60.8.0. For the others an update to
src:nss is needed as firefox-esr uses the system library.
[wheezy] - nss <ignored> (Issue is specific to TLS 1.3 and support was not really complete in 3.26; code has diverged significantly since and applying the fix would be very disruptive)