Opened 8 years ago

Closed 8 years ago

Last modified 8 years ago

#7040 closed enhancement (fixed)

nss-3.20.1

Reported by: Fernando de Oliveira Owned by: Fernando de Oliveira
Priority: high Milestone: 7.9
Component: BOOK Version: SVN
Severity: normal Keywords:
Cc:

Description (last modified by Fernando de Oliveira)

Changed the Description (now, release notes are available) and Priority (now it is high), because vulnerabilities have been fixed:

Solved

  • Bug 1192028 (CVE-2015-7181) and Bug 1202868 (CVE-2015-7182)
  • Bug 1205157 (NSPR, CVE-2015-7183)

https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_20_1_RTM/src/nss-3.20.1.tar.gz

https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_20_1_RTM/src/SHA1SUMS

6f123d05a8184cdc5ab4c903250f3c9b5b96dea4 nss-3.20.1.tar.gz

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes

NSS 3.20.1 release notes
by 1 contributor:

    kaie 

In This Article

    Introduction
    Distribution Information
    Security Advisories
    New in NSS 3.20.1
        New Functionality
    Compatibility
    Feedback 

Introduction

Network Security Services (NSS) 3.20.1 is a patch release for NSS 3.20.
The bug fixes in NSS 3.20.1 are described in the "Security Advisories"
section below.  Distribution Information

The HG tag is NSS_3_20_1_RTM. NSS 3.20.1 requires NSPR 4.10.10 or newer.

Security Advisories

The following security-relevant bugs have been resolved in NSS 3.20.1.
Users are encouraged to upgrade immediately.

   • Bug 1192028 (CVE-2015-7181) and Bug 1202868 (CVE-2015-7182):
     Several issues existed within the ASN.1 decoder used by NSS for
     handling streaming BER data. While the majority of NSS uses a
     separate, unaffected DER decoder, several public routines also
     accept BER data, and thus are affected. An attacker that
     successfully exploited these issues can overflow the heap and may
     be able to obtain remote code execution.

The following security-relevant bugs have been resolved in NSPR 4.10.10,
which affect NSS.
Because NSS includes portions of the affected NSPR code at build time,
it is necessary to use NSPR 4.10.10 when building NSS.

   • Bug 1205157 (NSPR, CVE-2015-7183):
     A logic bug in the handling of large allocations would allow
     exceptionally large allocations to be reported as successful,
     without actually allocating the requested memory. This may allow
     attackers to bypass security checks and obtain control of arbitrary
     memory.

New in NSS 3.20.1

New Functionality

No new functionality is introduced in this release. This is a patch
release to fix security-relevant bugs.

Compatibility

NSS 3.20.1 shared libraries are backward compatible with all older NSS
3.x shared libraries. A program linked with older NSS 3.x shared
libraries will work with NSS 3.20.1 shared libraries without recompiling
or relinking. Furthermore, applications that restrict their use of NSS
APIs to the functions listed in NSS Public Functions will remain
compatible with future versions of the NSS shared libraries.

Change History (3)

comment:1 by Fernando de Oliveira, 8 years ago

Owner: changed from blfs-book@… to Fernando de Oliveira
Status: newassigned

comment:2 by Fernando de Oliveira, 8 years ago

Resolution: fixed
Status: assignedclosed

Fixed at r16560.

comment:3 by Fernando de Oliveira, 8 years ago

Description: modified (diff)
Priority: normalhigh
Note: See TracTickets for help on using tickets.