|
|
Subscribe / Log in / New account

Mageia alert MGASA-2016-0114 (nss)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2016-0114: Updated nss packages fix CVE-2016-1950
Date:  Wed, 16 Mar 2016 19:07:52 +0100
Message-ID:  <20160316180752.095549F699@duvel.mageia.org>

MGASA-2016-0114 - Updated nss packages fix CVE-2016-1950 Publication date: 16 Mar 2016 URL: http://advisories.mageia.org/MGASA-2016-0114.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-1950 Description: Updated rootcerts and nss packages fix security vulnerability: A heap-based buffer overflow flaw was found in the way NSS parsed certain ASN.1 structures. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash, or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library (CVE-2016-1950). This issue was supposed to have been fixed in MGASA-2016-0105, but Mozilla did not include the fix until the following nss releases. References: - https://bugs.mageia.org/show_bug.cgi?id=17974 - https://www.mozilla.org/en-US/security/advisories/mfsa201... - https://developer.mozilla.org/en-US/docs/Mozilla/Projects... - http://advisories.mageia.org/MGASA-2016-0105.html - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950 SRPMS: - 5/core/rootcerts-20160225.00-1.mga5 - 5/core/nss-3.23.0-1.mga5


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds