Bug 1774835 (CVE-2019-11756) - CVE-2019-11756 nss: Use-after-free in sftk_FreeSession due to improper refcounting
Summary: CVE-2019-11756 nss: Use-after-free in sftk_FreeSession due to improper refcou...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-11756
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1781442 1781443 1898940 1898941 1898942
Blocks: 1774832
TreeView+ depends on / blocked
 
Reported: 2019-11-21 05:06 UTC by Huzaifa S. Sidhpurwala
Modified: 2021-03-30 09:27 UTC (History)
10 users (show)

Fixed In Version: nss 3.47
Doc Type: If docs needed, set a value
Doc Text:
A use-after-free flaw was found in Mozilla Network Security Services (NSS) related to PK11 session handling. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled with NSS.
Clone Of:
Environment:
Last Closed: 2020-08-03 13:27:43 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:3280 0 None None None 2020-08-03 13:01:21 UTC
Red Hat Product Errata RHSA-2020:4076 0 None None None 2020-09-29 20:58:08 UTC
Red Hat Product Errata RHSA-2021:0758 0 None None None 2021-03-09 09:17:08 UTC
Red Hat Product Errata RHSA-2021:0876 0 None None None 2021-03-16 14:52:21 UTC

Description Huzaifa S. Sidhpurwala 2019-11-21 05:06:42 UTC
A use-after-free was found in Mozilla nss, related to PK11 session handling. An attacker could this to execute arbitrary code with the permissions of user running the application (compiled with nss). This flaw is difficult to trigger (even impossible as per upstream)

Comment 1 Huzaifa S. Sidhpurwala 2019-11-21 05:06:46 UTC
Acknowledgments:

Name: the Mozilla project

Comment 2 Huzaifa S. Sidhpurwala 2019-12-10 03:10:14 UTC
External References:

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes

Comment 5 Huzaifa S. Sidhpurwala 2019-12-10 03:19:23 UTC
Upstream patch: 
https://hg.mozilla.org/projects/nss/rev/5619cbbca3db5f583a888181ec024069a46087aa

Upstream bug (currently private):
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776

Comment 6 Huzaifa S. Sidhpurwala 2019-12-10 03:21:04 UTC
Statement:

This flaw was fixed in upstream nss-3.47. Exploitation of this flaw is difficult and even impossible in most cases.

Comment 7 errata-xmlrpc 2020-08-03 13:01:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:3280 https://access.redhat.com/errata/RHSA-2020:3280

Comment 8 Product Security DevOps Team 2020-08-03 13:27:43 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-11756

Comment 12 errata-xmlrpc 2020-09-29 20:58:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:4076 https://access.redhat.com/errata/RHSA-2020:4076

Comment 13 errata-xmlrpc 2021-03-09 09:17:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.4 Advanced Update Support
  Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.4 Telco Extended Update Support

Via RHSA-2021:0758 https://access.redhat.com/errata/RHSA-2021:0758

Comment 14 errata-xmlrpc 2021-03-16 14:52:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.6 Extended Update Support

Via RHSA-2021:0876 https://access.redhat.com/errata/RHSA-2021:0876

Comment 15 errata-xmlrpc 2021-03-30 09:27:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.7 Extended Update Support

Via RHSA-2021:1026 https://access.redhat.com/errata/RHSA-2021:1026


Note You need to log in before you can comment on or make changes to this bug.