Name | CVE-2016-1951 |
Description | Multiple integer overflows in io/prprf.c in Mozilla Netscape Portable Runtime (NSPR) before 4.12 allow remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long string to a PR_*printf function. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-513-1, DSA-3687-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
firefox (PTS) | sid | 131.0.2-2 | fixed |
firefox-esr (PTS) | bullseye | 115.14.0esr-1~deb11u1 | fixed |
| bullseye (security) | 128.3.0esr-1~deb11u2 | fixed |
| bookworm | 115.14.0esr-1~deb12u1 | fixed |
| bookworm (security) | 128.3.1esr-1~deb12u1 | fixed |
| trixie | 128.3.0esr-2 | fixed |
| sid | 128.3.1esr-2 | fixed |
nspr (PTS) | bullseye | 2:4.29-1 | fixed |
| bookworm | 2:4.35-1 | fixed |
| sid, trixie | 2:4.35-1.1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[jessie] - nspr <no-dsa> (Minor issue)
https://bugzilla.mozilla.org/show_bug.cgi?id=1174015
https://groups.google.com/forum/#!topic/mozilla.dev.tech.nspr/dV4MyMsg6jw
Upstream commit: https://hg.mozilla.org/projects/nspr/rev/96381e3aaae2