vulnerability
CentOS Linux: CVE-2019-17023: Moderate: nss and nspr security, bug fix, and enhancement update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Jan 8, 2020 | Aug 4, 2020 | May 25, 2023 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Jan 8, 2020
Added
Aug 4, 2020
Modified
May 25, 2023
Description
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.
Solutions
centos-upgrade-nsprcentos-upgrade-nspr-debuginfocentos-upgrade-nspr-debugsourcecentos-upgrade-nspr-develcentos-upgrade-nsscentos-upgrade-nss-debuginfocentos-upgrade-nss-debugsourcecentos-upgrade-nss-develcentos-upgrade-nss-pkcs11-develcentos-upgrade-nss-softokncentos-upgrade-nss-softokn-debuginfocentos-upgrade-nss-softokn-develcentos-upgrade-nss-softokn-freeblcentos-upgrade-nss-softokn-freebl-debuginfocentos-upgrade-nss-softokn-freebl-develcentos-upgrade-nss-sysinitcentos-upgrade-nss-sysinit-debuginfocentos-upgrade-nss-toolscentos-upgrade-nss-tools-debuginfocentos-upgrade-nss-utilcentos-upgrade-nss-util-debuginfocentos-upgrade-nss-util-devel
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.