From: Mark H Weaver <mhw@netris.org>
To: Leo Famulari <leo@famulari.name>, 52228@debbugs.gnu.org
Subject: bug#52228: NSS CVE-2021-43527 "memory corruption validating dsa/rsa-pss signatures"
Date: Thu, 02 Dec 2021 21:07:41 -0500 [thread overview]
Message-ID: <87ee6uo2yf.fsf@netris.org> (raw)
In-Reply-To: <YaeyI/n69+eZMMRP@jasmine.lan>
Hi Leo,
Leo Famulari <leo@famulari.name> writes:
> An attacker-controlled memory corruption vulnerability was discovered in
> NSS:
>
> https://bugs.chromium.org/p/project-zero/issues/detail?id=2237
Thanks for bringing this to our attention. I just pushed a new
'gnuzilla-updates' branch, which is 'master' plus two new commits:
--8<---------------cut here---------------start------------->8---
commit 0863c665ebc54046baac7db1fde1f1f0e24476d0
Author: Mark H Weaver <mhw@netris.org>
Date: Thu Dec 2 20:23:16 2021 -0500
UNTESTED: gnu: nss: Fix CVE-2021-43527 via graft.
* gnu/packages/patches/nss-CVE-2021-43527.patch: New file.
* gnu/local.mk (dist_patch_DATA): Add it.
* gnu/packages/nss.scm (nss/fixed): New variable
(nss)[replacement]: New field.
commit bc6afae2466017d1a19725a86e69e666249a1b71
Author: Mark H Weaver <mhw@netris.org>
Date: Thu Dec 2 20:14:05 2021 -0500
UNTESTED: gnu: icecat: Fix CVE-2021-43527.
* gnu/packages/patches/icecat-CVE-2021-43527.patch: New file.
* gnu/local.mk (dist_patch_DATA): Add it.
* gnu/packages/gnuzilla.scm (icecat-source): Apply it.
--8<---------------cut here---------------end--------------->8---
As the summary lines indicate, I haven't yet tested these patches, apart
from verifying that the patched sources are built correctly.
If I'm not mistaken, ci.guix.gnu.org will soon evaluate the
'gnuzilla-updates' branch and perform the necessary rebuilds.
If all goes well, I'll cherry-pick these commits to 'master'.
If someone else verifies that the commits are good before I get to it,
please feel free to cherry-pick them to 'master' on my behalf (with the
"UNTESTED: " prefixes removed, of course).
Regards,
Mark
--
Disinformation flourishes because many people care deeply about injustice
but very few check the facts. Ask me about <https://stallmansupport.org>.
next prev parent reply other threads:[~2021-12-03 2:09 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-12-01 17:34 bug#52228: NSS CVE-2021-43527 "memory corruption validating dsa/rsa-pss signatures" Leo Famulari
2021-12-03 2:07 ` Mark H Weaver [this message]
2021-12-04 0:28 ` Mark H Weaver
2021-12-05 4:43 ` Leo Famulari
2022-03-23 2:34 ` Maxim Cournoyer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87ee6uo2yf.fsf@netris.org \
--to=mhw@netris.org \
--cc=52228@debbugs.gnu.org \
--cc=leo@famulari.name \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this external index
https://git.savannah.gnu.org/cgit/guix.git
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.