Bug 1315202 (CVE-2016-1979)
Summary: | CVE-2016-1979 nss: Use-after-free during processing of DER encoded keys in NSS (MFSA 2016-36) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | security-response-team, slawomir |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
A use-after-free flaw was found in the way NSS processed certain DER (Distinguished Encoding Rules) encoded cryptographic keys. An attacker could use this flaw to create a specially crafted DER encoded certificate which, when parsed by an application compiled against the NSS library, could cause that application to crash, or execute arbitrary code using the permissions of the user running the application.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 02:49:26 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1316003, 1323648, 1323649, 1323650, 1323651, 1323652 | ||
Bug Blocks: | 1310521 |
Description
Huzaifa S. Sidhpurwala
2016-03-07 09:02:25 UTC
Acknowledgments: Name: the Mozilla project Upstream: Tim Taubert Created nss tracking bugs for this issue: Affects: fedora-all [bug 1316003] This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:0591 https://rhn.redhat.com/errata/RHSA-2016-0591.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0685 https://rhn.redhat.com/errata/RHSA-2016-0685.html This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2016:0684 https://rhn.redhat.com/errata/RHSA-2016-0684.html |