| Summary: | nss - Avoid uninitialized data read in the event of a decryption failure (CVE-2013-1739) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Oden Eriksson <oe> |
| Component: | Security | Assignee: | Mageia Bug Squad <bugsquad> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | ||
| Version: | 3 | ||
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/570149/ | ||
| Whiteboard: | MGA2TOO | ||
| Source RPM: | nss | CVE: | |
| Status comment: | |||
| Bug Depends on: | 11370 | ||
| Bug Blocks: | |||
|
Description
Oden Eriksson
2013-10-23 07:36:21 CEST
Yep, I mentioned this one here: https://bugs.mageia.org/show_bug.cgi?id=11370#c2 I was thinking we could wait and push this when we do the FF/TB 24 updates. Any reason to do it sooner? URL:
(none) =>
http://lwn.net/Vulnerabilities/570149/ Ãou could, but I chose not to wait as I don't know when there's a new security release of ff 24. Fixed now that the Firefox update has been pushed. Status:
NEW =>
RESOLVED |