vulnerability

Red Hat: CVE-2019-17006: CVE-2019-17006 nss: Check length of inputs for cryptographic primitives (Multiple Advisories)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Aug 3, 2020
Added
Aug 4, 2020
Modified
Dec 15, 2023

Description

In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.

Solution(s)

redhat-upgrade-nsprredhat-upgrade-nspr-debuginforedhat-upgrade-nspr-debugsourceredhat-upgrade-nspr-develredhat-upgrade-nssredhat-upgrade-nss-debuginforedhat-upgrade-nss-debugsourceredhat-upgrade-nss-develredhat-upgrade-nss-pkcs11-develredhat-upgrade-nss-softoknredhat-upgrade-nss-softokn-debuginforedhat-upgrade-nss-softokn-develredhat-upgrade-nss-softokn-freeblredhat-upgrade-nss-softokn-freebl-debuginforedhat-upgrade-nss-softokn-freebl-develredhat-upgrade-nss-sysinitredhat-upgrade-nss-sysinit-debuginforedhat-upgrade-nss-toolsredhat-upgrade-nss-tools-debuginforedhat-upgrade-nss-utilredhat-upgrade-nss-util-debuginforedhat-upgrade-nss-util-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.