Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and serverapplications. Netscape Portable Runtime (NSPR) provides platformindependence for non-GUI operating system facilities. A use-after-poison flaw and a heap-based buffer overflow flaw were found inthe way NSS parsed certain ASN.1 structures. An attacker could use theseflaws to cause NSS to crash or execute arbitrary code with the permissionsof the user running an application compiled against the NSS library.(CVE-2015-7181, CVE-2015-7182)A heap-based buffer overflow was found in NSPR. An attacker could use thisflaw to cause NSPR to crash or execute arbitrary code with the permissionsof the user running an application compiled against the NSPR library.(CVE-2015-7183)Note: Applications using NSPR's PL_ARENA_ALLOCATE, PR_ARENA_ALLOCATE,PL_ARENA_GROW, or PR_ARENA_GROW macros need to be rebuilt against the fixednspr packages to completely resolve the CVE-2015-7183 issue. This erratumincludes nss and nss-utils packages rebuilt against the fixed nspr version.Red Hat would like to thank the Mozilla project for reporting these issues.Upstream acknowledges Tyson Smith, David Keeler, and Ryan Sleevi as theoriginal reporters.All nss, nss-util, and nspr users are advised to upgrade to these updatedpackages, which contain backported patches to correct these issues.