Bug 1774835 (CVE-2019-11756)
Summary: | CVE-2019-11756 nss: Use-after-free in sftk_FreeSession due to improper refcounting | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | crypto-team, dueno, elio.maldonado.batiz, hkario, kdudka, kengert, nss-nspr-maint, rrelyea, security-response-team, tvainio |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | nss 3.47 | Doc Type: | If docs needed, set a value |
Doc Text: |
A use-after-free flaw was found in Mozilla Network Security Services (NSS) related to PK11 session handling. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled with NSS.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-08-03 13:27:43 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1781442, 1781443, 1898940, 1898941, 1898942 | ||
Bug Blocks: | 1774832 |
Description
Huzaifa S. Sidhpurwala
2019-11-21 05:06:42 UTC
Acknowledgments: Name: the Mozilla project External References: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes Upstream patch: https://hg.mozilla.org/projects/nss/rev/5619cbbca3db5f583a888181ec024069a46087aa Upstream bug (currently private): https://bugzilla.mozilla.org/show_bug.cgi?id=1508776 Statement: This flaw was fixed in upstream nss-3.47. Exploitation of this flaw is difficult and even impossible in most cases. This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:3280 https://access.redhat.com/errata/RHSA-2020:3280 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-11756 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:4076 https://access.redhat.com/errata/RHSA-2020:4076 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2021:0758 https://access.redhat.com/errata/RHSA-2021:0758 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2021:0876 https://access.redhat.com/errata/RHSA-2021:0876 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2021:1026 https://access.redhat.com/errata/RHSA-2021:1026 |