Mozilla developer Tim Taubert used the Address Sanitizer tool and software fuzzing to discover a use-after-free vulnerability while processing DER encoded keys in the Network Security Services (NSS) libraries. The vulnerability overwrites the freed memory with zeroes. This issue has been addressed in NSS 3.21.1, shipping in Firefox 45. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2016-36
Acknowledgments: Name: the Mozilla project Upstream: Tim Taubert
Created nss tracking bugs for this issue: Affects: fedora-all [bug 1316003]
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:0591 https://rhn.redhat.com/errata/RHSA-2016-0591.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0685 https://rhn.redhat.com/errata/RHSA-2016-0685.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2016:0684 https://rhn.redhat.com/errata/RHSA-2016-0684.html