Bug 1347908 (CVE-2016-2834)
Summary: | CVE-2016-2834 nss: Multiple security flaws (MFSA 2016-61) | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | dueno, emaldona, hkario, huzaifas, kdudka, kengert, nmavrogi, nss-nspr-maint, rrelyea, sardella, slawomir, yozone | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | If docs needed, set a value | |||||
Doc Text: |
Multiple buffer handling flaws were found in the way NSS handled cryptographic data from the network. A remote attacker could use these flaws to crash an application using NSS or, possibly, execute arbitrary code with the permission of the user running the application.
|
Story Points: | --- | ||||
Clone Of: | Environment: | ||||||
Last Closed: | 2016-11-16 06:12:07 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1383884, 1383885, 1383886, 1383887, 1383888, 1416776 | ||||||
Bug Blocks: | 1343293, 1380228 | ||||||
Attachments: |
|
Description
Huzaifa S. Sidhpurwala
2016-06-18 08:40:05 UTC
This flaw corresponds to the following upstream commits: https://hg.mozilla.org/projects/nss/rev/8d78a5ae260a https://hg.mozilla.org/projects/nss/rev/1ba7cd83c672 https://hg.mozilla.org/projects/nss/rev/5fde729fdbff https://hg.mozilla.org/projects/nss/rev/329932eb1700 These security flaws were fixed in nss-3.23 Fedora 22 and Fedora 23 already contains nss-3.24 and therefore is not affected by these flaws. Mitigation: Do not use NSS to parse untrusted certificates. (In reply to Huzaifa S. Sidhpurwala from comment #2) > This flaw corresponds to the following upstream commits: > > https://hg.mozilla.org/projects/nss/rev/8d78a5ae260a > https://hg.mozilla.org/projects/nss/rev/1ba7cd83c672 > https://hg.mozilla.org/projects/nss/rev/5fde729fdbff > https://hg.mozilla.org/projects/nss/rev/329932eb1700 The patches apply cleanly on top of each other in the following order: https://hg.mozilla.org/projects/nss/rev/8d78a5ae260a https://hg.mozilla.org/projects/nss/rev/5fde729fdbff https://hg.mozilla.org/projects/nss/rev/1ba7cd83c672 https://hg.mozilla.org/projects/nss/rev/329932eb1700 I recommend to add the following very minor change, which only affects test code, but was made before the above changes, so including it makes sense for completeness: https://hg.mozilla.org/projects/nss/rev/b6bcbd62e833 I have merged all those changes into a single patch, which I'm attaching to the bug. The patches seem isolated, without references to other code. Backporting should be safe. Created attachment 1210200 [details]
backported patch
*** Bug 1380171 has been marked as a duplicate of this bug. *** *** Bug 1380172 has been marked as a duplicate of this bug. *** *** Bug 1380173 has been marked as a duplicate of this bug. *** This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 5 Via RHSA-2016:2779 https://rhn.redhat.com/errata/RHSA-2016-2779.html |