A vulnerability exists where it possible to force Network Security Services (NSS) to sign `CertificateVerify` with PKCS#1 v1.5 signatures when those are the only ones advertised by server in `CertificateRequest` in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
Acknowledgments: Name: the Mozilla project Upstream: Hubert Kario
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-11727
Upstream commit: https://hg.mozilla.org/projects/nss/rev/17c6fc2ec3c1feaed56ef59b35bf435c7d5c4949
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:1951 https://access.redhat.com/errata/RHSA-2019:1951
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:4076 https://access.redhat.com/errata/RHSA-2020:4076