Hide Forgot
A flaw was found in the way NSS verifies certificates. That will happen both when client reads the Certificate message from the server or when server is configured to ask for client certificates and then receives one. Firefox is not vulnerable as it uses the mozilla::pkix for certificate verification. Crucially, NSS fully parses the certificate before any other checks, so disabled signature methods or certificate types don't impact exploitability. Any TLS and DTLS client that does use NSS built in certificate verification routines is vulnerable as well as any server that has certificate based client authentication enabled. But the issue is not limited to TLS, any applications that use certificate verification are vulnerable, S/MIME is impacted too.
Upstream patch: https://hg.mozilla.org/projects/nss/rev/6b3dc97a8767d9dc5c4c181597d1341d0899aa58
Created nss tracking bugs for this issue: Affects: fedora-all [bug 2028186]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4903 https://access.redhat.com/errata/RHSA-2021:4903
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:4904 https://access.redhat.com/errata/RHSA-2021:4904
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Extended Lifecycle Support Via RHSA-2021:4907 https://access.redhat.com/errata/RHSA-2021:4907
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2021:4909 https://access.redhat.com/errata/RHSA-2021:4909
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:4919 https://access.redhat.com/errata/RHSA-2021:4919
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Via RHSA-2021:4932 https://access.redhat.com/errata/RHSA-2021:4932
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Advanced Update Support Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions Red Hat Enterprise Linux 7.6 Telco Extended Update Support Via RHSA-2021:4933 https://access.redhat.com/errata/RHSA-2021:4933
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Advanced Update Support Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions Red Hat Enterprise Linux 7.7 Telco Extended Update Support Via RHSA-2021:4946 https://access.redhat.com/errata/RHSA-2021:4946
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:4953 https://access.redhat.com/errata/RHSA-2021:4953
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:4954 https://access.redhat.com/errata/RHSA-2021:4954
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2021:4969 https://access.redhat.com/errata/RHSA-2021:4969
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Advanced Update Support Via RHSA-2021:4994 https://access.redhat.com/errata/RHSA-2021:4994
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2021:5006 https://access.redhat.com/errata/RHSA-2021:5006
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Via RHSA-2021:5035 https://access.redhat.com/errata/RHSA-2021:5035
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-43527