CVE-2016-9574

NameCVE-2016-9574
Descriptionnss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nss (PTS)jessie, jessie (lts)2:3.26-1+debu8u19fixed
stretch (security)2:3.26.2-1.1+deb9u5fixed
stretch (lts), stretch2:3.26.2-1.1+deb9u8fixed
buster, buster (lts)2:3.42.1-1+deb10u9fixed
buster (security)2:3.42.1-1+deb10u8fixed
bullseye2:3.61-1+deb11u3fixed
bullseye (security)2:3.61-1+deb11u4fixed
bookworm2:3.87.1-1fixed
bookworm (security)2:3.87.1-1+deb12u1fixed
trixie2:3.105-2fixed
sid2:3.106-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nsssource(unstable)2:3.25-1

Notes

https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
The CVE is specific to the segfault resulting from the reproducing steps
as per buzilla entry, and https://bugzilla.redhat.com/show_bug.cgi?id=1397482
https://hg.mozilla.org/projects/nss/rev/7385cd821735

Search for package or bug name: Reporting problems