Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2020:0008-1

Опубликовано: 11 янв. 2020
Источник: suse-cvrf

Описание

Security update for mozilla-nspr, mozilla-nss

This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to NSS 3.47.1:

Security issues fixed:

  • CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
  • CVE-2019-11745: EncryptUpdate should use maxout, not block size (bsc#1158527).
  • CVE-2019-11727: Fixed vulnerability sign CertificateVerify with PKCS#1 v1.5 signatures issue (bsc#1141322).

mozilla-nspr was updated to version 4.23:

  • Whitespace in C files was cleaned up and no longer uses tab characters for indenting.

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.1
libfreebl3-3.47.1-lp151.2.9.1
libfreebl3-32bit-3.47.1-lp151.2.9.1
libfreebl3-hmac-3.47.1-lp151.2.9.1
libfreebl3-hmac-32bit-3.47.1-lp151.2.9.1
libsoftokn3-3.47.1-lp151.2.9.1
libsoftokn3-32bit-3.47.1-lp151.2.9.1
libsoftokn3-hmac-3.47.1-lp151.2.9.1
libsoftokn3-hmac-32bit-3.47.1-lp151.2.9.1
mozilla-nspr-4.23-lp151.2.6.1
mozilla-nspr-32bit-4.23-lp151.2.6.1
mozilla-nspr-devel-4.23-lp151.2.6.1
mozilla-nss-3.47.1-lp151.2.9.1
mozilla-nss-32bit-3.47.1-lp151.2.9.1
mozilla-nss-certs-3.47.1-lp151.2.9.1
mozilla-nss-certs-32bit-3.47.1-lp151.2.9.1
mozilla-nss-devel-3.47.1-lp151.2.9.1
mozilla-nss-sysinit-3.47.1-lp151.2.9.1
mozilla-nss-sysinit-32bit-3.47.1-lp151.2.9.1
mozilla-nss-tools-3.47.1-lp151.2.9.1

Описание

In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.


Затронутые продукты
openSUSE Leap 15.1:libfreebl3-3.47.1-lp151.2.9.1
openSUSE Leap 15.1:libfreebl3-32bit-3.47.1-lp151.2.9.1
openSUSE Leap 15.1:libfreebl3-hmac-3.47.1-lp151.2.9.1
openSUSE Leap 15.1:libfreebl3-hmac-32bit-3.47.1-lp151.2.9.1

Ссылки

Описание

When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.


Затронутые продукты
openSUSE Leap 15.1:libfreebl3-3.47.1-lp151.2.9.1
openSUSE Leap 15.1:libfreebl3-32bit-3.47.1-lp151.2.9.1
openSUSE Leap 15.1:libfreebl3-hmac-3.47.1-lp151.2.9.1
openSUSE Leap 15.1:libfreebl3-hmac-32bit-3.47.1-lp151.2.9.1

Ссылки

Описание

In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.


Затронутые продукты
openSUSE Leap 15.1:libfreebl3-3.47.1-lp151.2.9.1
openSUSE Leap 15.1:libfreebl3-32bit-3.47.1-lp151.2.9.1
openSUSE Leap 15.1:libfreebl3-hmac-3.47.1-lp151.2.9.1
openSUSE Leap 15.1:libfreebl3-hmac-32bit-3.47.1-lp151.2.9.1

Ссылки
Уязвимость openSUSE-SU-2020:0008-1