Name | CVE-2016-2834 |
Description | Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-527-1, DSA-3688-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
firefox (PTS) | sid | 132.0.2-1 | fixed |
firefox-esr (PTS) | jessie, jessie (lts) | 68.9.0esr-1~deb8u2 | fixed |
| stretch (security), stretch (lts), stretch | 91.11.0esr-1~deb9u1 | fixed |
| buster (security), buster, buster (lts) | 115.12.0esr-1~deb10u1 | fixed |
| bullseye | 115.14.0esr-1~deb11u1 | fixed |
| bullseye (security) | 128.4.0esr-1~deb11u1 | fixed |
| bookworm | 128.3.1esr-1~deb12u1 | fixed |
| bookworm (security) | 128.4.0esr-1~deb12u1 | fixed |
| sid, trixie | 128.4.0esr-1 | fixed |
nss (PTS) | jessie, jessie (lts) | 2:3.26-1+debu8u19 | fixed |
| stretch (security) | 2:3.26.2-1.1+deb9u5 | fixed |
| stretch (lts), stretch | 2:3.26.2-1.1+deb9u8 | fixed |
| buster, buster (lts) | 2:3.42.1-1+deb10u9 | fixed |
| buster (security) | 2:3.42.1-1+deb10u8 | fixed |
| bullseye | 2:3.61-1+deb11u3 | fixed |
| bullseye (security) | 2:3.61-1+deb11u4 | fixed |
| bookworm | 2:3.87.1-1 | fixed |
| bookworm (security) | 2:3.87.1-1+deb12u1 | fixed |
| trixie | 2:3.105-2 | fixed |
| sid | 2:3.106-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
firefox | source | (unstable) | 47.0-1 | | | |
firefox-esr | source | (unstable) | (not affected) | | | |
nss | source | wheezy | 2:3.14.5-1+deb7u8 | | DLA-527-1 | |
nss | source | jessie | 2:3.26-1+debu8u1 | | DSA-3688-1 | |
nss | source | (unstable) | 2:3.23-1 | | | |
Notes
- firefox-esr <not-affected> (Doesn't apply to Firefox ESR)
https://www.mozilla.org/en-US/security/advisories/mfsa2016-61/