CVE-2019-11745

Priority
Description
When encrypting with a block cipher, if a call to NSC_EncryptUpdate was
made with data smaller than the block size, a small out of bounds write
could occur. This could have caused heap corruption and a potentially
exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox
ESR < 68.3, and Firefox < 71.
Assigned-to
mdeslaur
Notes
Package
Upstream:released (71.0)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (71.0+build5-0ubuntu0.16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (71.0+build5-0ubuntu0.18.04.1)
Ubuntu 19.10 (Eoan Ermine):released (71.0+build5-0ubuntu0.19.10.1)
Ubuntu 20.04 (Focal Fossa):released (71.0+build5-0ubuntu1)
Package
Source: nss (LP Ubuntu Debian)
Upstream:released (3.44.3,3.47.1)
Ubuntu 12.04 ESM (Precise Pangolin):released (2:3.28.4-0ubuntu0.12.04.5)
Ubuntu 14.04 ESM (Trusty Tahr):released (2:3.28.4-0ubuntu0.14.04.5+esm2)
Ubuntu 16.04 LTS (Xenial Xerus):released (2:3.28.4-0ubuntu0.16.04.8)
Ubuntu 18.04 LTS (Bionic Beaver):released (2:3.35-2ubuntu2.5)
Ubuntu 19.10 (Eoan Ermine):released (2:3.45-1ubuntu2.1)
Ubuntu 20.04 (Focal Fossa):released (2:3.47-1ubuntu2)
Patches:
Upstream:https://hg.mozilla.org/projects/nss/rev/1e22a0c93afe9f46545560c86caedef9dab6cfda (master)
Upstream:https://hg.mozilla.org/projects/nss/rev/60bca7c6dc6dc44579b9b3e0fb62ca3b82d92eec (3.44)
Upstream:https://hg.mozilla.org/projects/nss/rev/4c20de402b3901df0cde590a46be2ba49adc028e (3.47)
Package
Upstream:released (68.3)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (1:68.7.0+build1-0ubuntu0.16.04.2)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:68.4.1+build1-0ubuntu0.18.04.1)
Ubuntu 19.10 (Eoan Ermine):released (1:68.4.1+build1-0ubuntu0.19.10.1)
Ubuntu 20.04 (Focal Fossa):released (1:68.3.0+build2-0ubuntu1)
More Information

Updated: 2020-04-21 23:22:10 UTC (commit d561fac80febc8c3f3b3fa9e461482b7aca4e740)