RedHat nss CVE-2023-0767 Vulnerability

description-logoDescription

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767) Bug Fix(es): In FIPS mode, nss should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator. (BZ#2177434) Need to update FIPS review comments into NSS RHEL-9. (BZ#2177875) In FIPS mode, nss should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator. (BZ#2177434) Need to update FIPS review comments into NSS RHEL-9. (BZ#2177875) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258 After installing this update, applications using NSS (for example, Firefox) must be restarted for this update to take effect.

affected-products-logoAffected Applications

nss

CVE References

CVE-2023-0767