Bug 2170377 (CVE-2023-0767)

Summary: CVE-2023-0767 nss: Arbitrary memory write via PKCS 12
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: arachman, asosedki, erack, jhorak, lveyde, michal.skrivanek, mperina, nobody, nss-nspr-maint, rrelyea, saroy, sbonazzo, ssorce, stransky, thoger, tpopela
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: firefox 102.8, thunderbird 102.8, nss 3.88.1, nss 3.79.4 Doc Type: If docs needed, set a value
Doc Text:
The Mozilla Foundation Security Advisory describes this flaw as: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-03-23 13:47:02 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2176392, 2176620, 2176621, 2176622, 2176623, 2176624, 2176625, 2176626, 2176627, 2176628, 2176629, 2176630, 2176631, 2177157, 2177158, 2177159, 2177160, 2177161, 2177162, 2177218, 2178006    
Bug Blocks: 2177152    

Description Dhananjay Arunesh 2023-02-16 09:09:10 UTC
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled.

External Reference:
https://www.mozilla.org/en-US/security/advisories/mfsa2023-06/#CVE-2023-0767

Comment 1 errata-xmlrpc 2023-02-20 08:16:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2023:0806 https://access.redhat.com/errata/RHSA-2023:0806

Comment 2 errata-xmlrpc 2023-02-20 08:18:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2023:0805 https://access.redhat.com/errata/RHSA-2023:0805

Comment 3 errata-xmlrpc 2023-02-20 08:23:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:0809 https://access.redhat.com/errata/RHSA-2023:0809

Comment 4 errata-xmlrpc 2023-02-20 08:25:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:0810 https://access.redhat.com/errata/RHSA-2023:0810

Comment 5 errata-xmlrpc 2023-02-20 08:25:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:0807 https://access.redhat.com/errata/RHSA-2023:0807

Comment 6 errata-xmlrpc 2023-02-20 08:26:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2023:0811 https://access.redhat.com/errata/RHSA-2023:0811

Comment 7 errata-xmlrpc 2023-02-20 08:27:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:0808 https://access.redhat.com/errata/RHSA-2023:0808

Comment 8 errata-xmlrpc 2023-02-20 08:27:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:0812 https://access.redhat.com/errata/RHSA-2023:0812

Comment 9 errata-xmlrpc 2023-02-20 12:12:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2023:0818 https://access.redhat.com/errata/RHSA-2023:0818

Comment 10 errata-xmlrpc 2023-02-20 12:12:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2023:0819 https://access.redhat.com/errata/RHSA-2023:0819

Comment 11 errata-xmlrpc 2023-02-20 12:16:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:0822 https://access.redhat.com/errata/RHSA-2023:0822

Comment 12 errata-xmlrpc 2023-02-20 12:16:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:0817 https://access.redhat.com/errata/RHSA-2023:0817

Comment 13 errata-xmlrpc 2023-02-20 12:17:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:0824 https://access.redhat.com/errata/RHSA-2023:0824

Comment 14 errata-xmlrpc 2023-02-20 12:17:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2023:0820 https://access.redhat.com/errata/RHSA-2023:0820

Comment 15 errata-xmlrpc 2023-02-20 12:17:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:0821 https://access.redhat.com/errata/RHSA-2023:0821

Comment 16 errata-xmlrpc 2023-02-20 12:18:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:0823 https://access.redhat.com/errata/RHSA-2023:0823

Comment 17 Product Security DevOps Team 2023-02-20 17:51:18 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-0767

Comment 20 Mauro Matteo Cascella 2023-03-08 10:00:14 UTC
Created nss tracking bugs for this issue:

Affects: fedora-all [bug 2176392]

Comment 49 errata-xmlrpc 2023-03-15 10:00:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:1252 https://access.redhat.com/errata/RHSA-2023:1252

Comment 50 errata-xmlrpc 2023-03-20 09:25:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:1332 https://access.redhat.com/errata/RHSA-2023:1332

Comment 51 errata-xmlrpc 2023-03-21 08:17:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:1365 https://access.redhat.com/errata/RHSA-2023:1365

Comment 52 errata-xmlrpc 2023-03-21 09:33:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:1368 https://access.redhat.com/errata/RHSA-2023:1368

Comment 53 errata-xmlrpc 2023-03-21 09:33:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6 Extended Lifecycle Support

Via RHSA-2023:1366 https://access.redhat.com/errata/RHSA-2023:1366

Comment 54 errata-xmlrpc 2023-03-21 09:43:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:1369 https://access.redhat.com/errata/RHSA-2023:1369

Comment 55 errata-xmlrpc 2023-03-21 09:43:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2023:1370 https://access.redhat.com/errata/RHSA-2023:1370

Comment 56 errata-xmlrpc 2023-03-22 10:37:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2023:1406 https://access.redhat.com/errata/RHSA-2023:1406

Comment 57 errata-xmlrpc 2023-03-23 09:05:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2023:1436 https://access.redhat.com/errata/RHSA-2023:1436

Comment 58 Product Security DevOps Team 2023-03-23 13:46:59 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-0767

Comment 59 errata-xmlrpc 2023-03-27 15:11:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2023:1479 https://access.redhat.com/errata/RHSA-2023:1479

Comment 60 errata-xmlrpc 2023-04-10 01:30:32 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for Red Hat Enterprise Linux 8

Via RHSA-2023:1677 https://access.redhat.com/errata/RHSA-2023:1677