| Summary: | CVE-2016-1950 nss: Heap buffer overflow vulnerability in ASN1 certificate parsing (MFSA 2016-35) | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> | ||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
| Status: | CLOSED ERRATA | QA Contact: | |||||
| Severity: | urgent | Docs Contact: | |||||
| Priority: | urgent | ||||||
| Version: | unspecified | CC: | ajanorka, emaldona, hkario, huzaifas, kengert, rrelyea, security-response-team, slawomir, slong, szidek | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: |
A heap-based buffer overflow flaw was found in the way NSS parsed certain ASN.1 structures. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash, or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library.
|
Story Points: | --- | ||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2016-03-29 03:41:57 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Bug Depends On: | 1310512, 1310513, 1310514, 1310515, 1310516, 1316002, 1317443, 1317444, 1317445, 1317446, 1317448 | ||||||
| Bug Blocks: | 1310521 | ||||||
| Attachments: |
|
||||||
|
Description
Huzaifa S. Sidhpurwala
2016-02-22 04:57:48 UTC
Created attachment 1129399 [details]
upstream patch on top of nss 3.21, from nss 3.21.1
Acknowledgements: Name: the Mozilla project Upstream: Francis Gabriel External References: https://www.mozilla.org/en-US/security/advisories/mfsa2016-35 This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2016:0371 https://rhn.redhat.com/errata/RHSA-2016-0371.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 6 Via RHSA-2016:0370 https://rhn.redhat.com/errata/RHSA-2016-0370.html Created nss-util tracking bugs for this issue: Affects: fedora-all [bug 1316002] This issue has been addressed in the following products: Red Hat Enterprise Linux 7.1 Extended Update Support Red Hat Enterprise Linux 6.2 Advanced Update Support Red Hat Enterprise Linux 6.4 Advanced Update Support Red Hat Enterprise Linux 6.5 Advanced Update Support Red Hat Enterprise Linux 6.6 Extended Update Support Via RHSA-2016:0495 https://rhn.redhat.com/errata/RHSA-2016-0495.html |