Bug 1774835 (CVE-2019-11756)

Summary: CVE-2019-11756 nss: Use-after-free in sftk_FreeSession due to improper refcounting
Product: [Other] Security Response Reporter: Huzaifa S. Sidhpurwala <huzaifas>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: crypto-team, dueno, elio.maldonado.batiz, hkario, kdudka, kengert, nss-nspr-maint, rrelyea, security-response-team, tvainio
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: nss 3.47 Doc Type: If docs needed, set a value
Doc Text:
A use-after-free flaw was found in Mozilla Network Security Services (NSS) related to PK11 session handling. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled with NSS.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-08-03 13:27:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1781442, 1781443, 1898940, 1898941, 1898942    
Bug Blocks: 1774832    

Description Huzaifa S. Sidhpurwala 2019-11-21 05:06:42 UTC
A use-after-free was found in Mozilla nss, related to PK11 session handling. An attacker could this to execute arbitrary code with the permissions of user running the application (compiled with nss). This flaw is difficult to trigger (even impossible as per upstream)

Comment 1 Huzaifa S. Sidhpurwala 2019-11-21 05:06:46 UTC
Acknowledgments:

Name: the Mozilla project

Comment 2 Huzaifa S. Sidhpurwala 2019-12-10 03:10:14 UTC
External References:

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes

Comment 5 Huzaifa S. Sidhpurwala 2019-12-10 03:19:23 UTC
Upstream patch: 
https://hg.mozilla.org/projects/nss/rev/5619cbbca3db5f583a888181ec024069a46087aa

Upstream bug (currently private):
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776

Comment 6 Huzaifa S. Sidhpurwala 2019-12-10 03:21:04 UTC
Statement:

This flaw was fixed in upstream nss-3.47. Exploitation of this flaw is difficult and even impossible in most cases.

Comment 7 errata-xmlrpc 2020-08-03 13:01:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:3280 https://access.redhat.com/errata/RHSA-2020:3280

Comment 8 Product Security DevOps Team 2020-08-03 13:27:43 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-11756

Comment 12 errata-xmlrpc 2020-09-29 20:58:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:4076 https://access.redhat.com/errata/RHSA-2020:4076

Comment 13 errata-xmlrpc 2021-03-09 09:17:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.4 Advanced Update Support
  Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.4 Telco Extended Update Support

Via RHSA-2021:0758 https://access.redhat.com/errata/RHSA-2021:0758

Comment 14 errata-xmlrpc 2021-03-16 14:52:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.6 Extended Update Support

Via RHSA-2021:0876 https://access.redhat.com/errata/RHSA-2021:0876

Comment 15 errata-xmlrpc 2021-03-30 09:27:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.7 Extended Update Support

Via RHSA-2021:1026 https://access.redhat.com/errata/RHSA-2021:1026