Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1396548 - (CVE-2016-9074) CVE-2016-9074 nss: Insufficient timing side-channel resistance in divSpoiler
CVE-2016-9074 nss: Insufficient timing side-channel resistance in divSpoiler
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20161115,repor...
: Security
Depends On: 1396550
Blocks: 1396555
  Show dependency treegraph
 
Reported: 2016-11-18 10:37 EST by Adam Mariš
Modified: 2018-10-31 18:46 EDT (History)
6 users (show)

See Also:
Fixed In Version: nss 3.26.1
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-11-18 10:37:54 EST
An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1.

External References:

https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074
Comment 1 Adam Mariš 2016-11-18 10:38:09 EST
Acknowledgments:

Name: the Mozilla project
Upstream: Franziskus Kiefer
Comment 2 Adam Mariš 2016-11-18 10:38:33 EST
Created nss tracking bugs for this issue:

Affects: fedora-all [bug 1396550]
Comment 3 Huzaifa S. Sidhpurwala 2016-11-24 23:12:44 EST
Upstream commit:

https://hg.mozilla.org/projects/nss/rev/1e202f0a01b9

Note You need to log in before you can comment on or make changes to this bug.