Bug 1396548 (CVE-2016-9074)

Summary: CVE-2016-9074 nss: Insufficient timing side-channel resistance in divSpoiler
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dueno, kdudka, nss-nspr-maint, rrelyea, sardella, slawomir
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: nss 3.26.1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:02:22 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1396550    
Bug Blocks: 1396555    

Description Adam Mariš 2016-11-18 15:37:54 UTC
An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1.

External References:

https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074

Comment 1 Adam Mariš 2016-11-18 15:38:09 UTC
Acknowledgments:

Name: the Mozilla project
Upstream: Franziskus Kiefer

Comment 2 Adam Mariš 2016-11-18 15:38:33 UTC
Created nss tracking bugs for this issue:

Affects: fedora-all [bug 1396550]

Comment 3 Huzaifa S. Sidhpurwala 2016-11-25 04:12:44 UTC
Upstream commit:

https://hg.mozilla.org/projects/nss/rev/1e202f0a01b9