Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-4152

Опубликовано: 11 дек. 2019
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2019-4152: nss-softokn security update (IMPORTANT)

[3.44.0-6.0.1]

  • Add fips140-2 DSA Known Answer Test fix [Orabug 26696773]
  • Add fips140-2 ECDSA/RSA/DSA Pairwise Consistency Test fix [Orabug 26617866], [Orabug 26617833], [Orabug 26617780]

[3.44.0-6]

  • Fix out-of-bounds write in NSC_EncryptUpdate (#1775909)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

nss-softokn

3.44.0-6.0.1.el6_10

nss-softokn-devel

3.44.0-6.0.1.el6_10

nss-softokn-freebl

3.44.0-6.0.1.el6_10

nss-softokn-freebl-devel

3.44.0-6.0.1.el6_10

Oracle Linux i686

nss-softokn

3.44.0-6.0.1.el6_10

nss-softokn-devel

3.44.0-6.0.1.el6_10

nss-softokn-freebl

3.44.0-6.0.1.el6_10

nss-softokn-freebl-devel

3.44.0-6.0.1.el6_10

Связанные CVE

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 6 лет назад

When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.

CVSS3: 8.1
redhat
около 6 лет назад

When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.

CVSS3: 8.8
nvd
почти 6 лет назад

When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.

CVSS3: 8.8
debian
почти 6 лет назад

When encrypting with a block cipher, if a call to NSC_EncryptUpdate wa ...

github
больше 3 лет назад

When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.