CVE-2016-9574

NameCVE-2016-9574
Descriptionnss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nss (PTS)buster2:3.42.1-1+deb10u5fixed
buster (security)2:3.42.1-1+deb10u8fixed
bullseye (security), bullseye2:3.61-1+deb11u3fixed
bookworm2:3.87.1-1fixed
sid, trixie2:3.99-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nsssource(unstable)2:3.25-1

Notes

https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
The CVE is specific to the segfault resulting from the reproducing steps
as per buzilla entry, and https://bugzilla.redhat.com/show_bug.cgi?id=1397482
https://hg.mozilla.org/projects/nss/rev/7385cd821735

Search for package or bug name: Reporting problems