NSS allows an attacker to send CCS messages in a row after ClientHello message. If an attacker put multiple CCS messages in a single tcp packet, the NSS server will stuck in a loop for many times to process the messages. This issue affects servers which are compiled against the NSS library. Other consumers of NSS like firefox etc are not affected by this flaw.
Upstream patch: https://hg.mozilla.org/projects/nss/rev/57bbefa793232586d27cee83e74411171e128361 Upstream bug (currently private): https://bugzilla.mozilla.org/show_bug.cgi?id=1641480
Statement: This flaw only affects servers that are compiled with the NSS library and when the TLS 1.3 protocol is used.
External References: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
Acknowledgments: Name: the Mozilla project
Wrong bug.
Hello Can we have status update on this CVE for RHEL platforms marked affected as per https://access.redhat.com/security/cve/cve-2020-25648. I notice that for fedora, it has already been marked fixed at https://bugzilla.redhat.com/show_bug.cgi?id=1889579 Regards, Divya
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:1384 https://access.redhat.com/errata/RHSA-2021:1384
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-25648
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:3572 https://access.redhat.com/errata/RHSA-2021:3572