Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-0370

Опубликовано: 09 мар. 2016
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2016-0370: nss-util security update (CRITICAL)

[3.19.1-5]

  • Actually apply the fix for CVE-2016-1950 from NSS 3.19.2.3 ...

[3.19.1-4]

  • Rebuild to ensure use of correct NSPR.

[3.19.1-3]

  • Include the fix for CVE-2016-1950 from NSS 3.19.2.3

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

nss-util

3.19.1-5.el6_7

nss-util-devel

3.19.1-5.el6_7

Oracle Linux i686

nss-util

3.19.1-5.el6_7

nss-util-devel

3.19.1-5.el6_7

Oracle Linux 7

Oracle Linux x86_64

nss-util

3.19.1-9.el7_2

nss-util-devel

3.19.1-9.el7_2

Связанные CVE

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 9 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.

redhat
больше 9 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.

CVSS3: 8.8
nvd
больше 9 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.

CVSS3: 8.8
debian
больше 9 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) ...

CVSS3: 8.8
github
больше 3 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.