Package: libnss3-tools
Version: 2:3.73-1
Severity: important
X-Debbugs-Cc: bugrepo...@gringene.org

Dear Maintainer,

I've recently noticed a bug in nss that was reported on Google Project Zero:

https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html

The reporter's claim is as follows:

> The maximum size signature that this structure can handle is whatever the 
> largest union member is, in this case that’s RSA at 2048 bytes. That’s 16384 
> bits, large enough to accommodate signatures from even the most ridiculously 
> oversized keys.

> Okay, but what happens if you just....make a signature that’s bigger than 
> that?

> Well, it turns out the answer is memory corruption. Yes, really.

I have tried out their example code on my Debian system, and it results in the 
reported Segmentation fault. This is interesting, given that the stated fixed 
version is NSS 3.73.0, and Debian is reporting that 3.73-1 is installed.

-- System Information:
Debian Release: 11.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (500, 'oldstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-8-amd64 (SMP w/12 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_NZ.UTF-8, LC_CTYPE=en_NZ.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_NZ:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libnss3-tools depends on:
ii  libc6     2.31-13+deb11u2
ii  libnspr4  2:4.32-1
ii  libnss3   2:3.68-1
ii  zlib1g    1:1.2.11.dfsg-2

libnss3-tools recommends no packages.

libnss3-tools suggests no packages.

-- no debconf information

Reply via email to