DSA-5016-1 nss -- security update

Related Vulnerabilities: CVE-2021-43527  

Tavis Ormandy discovered that nss, the Mozilla Network Security Service library, is prone to a heap overflow flaw when verifying DSA or RSA-PPS signatures, which could result in denial of service or potentially the execution of arbitrary code. For the oldstable distribution (buster), this problem has been fixed in version 2:3.42.1-1+deb10u4. For the stable distribution (bullseye), this problem has been fixed in version 2:3.61-1+deb11u1. We recommend that you upgrade your nss packages. For the detailed security status of nss please refer to its security tracker page at: https://security-tracker.debian.org/tracker/nss

Debian Security Advisory

DSA-5016-1 nss -- security update

Date Reported:
01 Dec 2021
Affected Packages:
nss
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2021-43527.
More information:

Tavis Ormandy discovered that nss, the Mozilla Network Security Service library, is prone to a heap overflow flaw when verifying DSA or RSA-PPS signatures, which could result in denial of service or potentially the execution of arbitrary code.

For the oldstable distribution (buster), this problem has been fixed in version 2:3.42.1-1+deb10u4.

For the stable distribution (bullseye), this problem has been fixed in version 2:3.61-1+deb11u1.

We recommend that you upgrade your nss packages.

For the detailed security status of nss please refer to its security tracker page at: https://security-tracker.debian.org/tracker/nss