Bug 1315565 (CVE-2016-1978)
Summary: | CVE-2016-1978 nss: Use-after-free in NSS during SSL connections in low memory (MFSA 2016-15) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | security-response-team, slawomir |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
A use-after-free flaw was found in the way NSS handled DHE (Diffie–Hellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages. A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special conditions, execute arbitrary code using the permissions of the user running the application.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 02:49:30 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1316003, 1323648, 1323649, 1323650, 1323651, 1323652 | ||
Bug Blocks: | 1310521 |
Description
Huzaifa S. Sidhpurwala
2016-03-08 05:44:23 UTC
Acknowledgments: Name: the Mozilla project Upstream: Eric Rescorla Created nss tracking bugs for this issue: Affects: fedora-all [bug 1316003] This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:0591 https://rhn.redhat.com/errata/RHSA-2016-0591.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0685 https://rhn.redhat.com/errata/RHSA-2016-0685.html This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2016:0684 https://rhn.redhat.com/errata/RHSA-2016-0684.html |