Heap-based Buffer Overflow Affecting nss package, versions <0:3.90.0-2.amzn2.0.2
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-AMZN2-NSS-6229002
- published 6 Feb 2024
- disclosed 29 Dec 2023
Introduced: 29 Dec 2023
CVE-2023-7104 Open this link in a new tabHow to fix?
Upgrade Amazon-Linux:2
nss
to version 0:3.90.0-2.amzn2.0.2 or higher.
This issue was patched in ALAS2-2024-2442
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss
package and not the nss
package as distributed by Amazon-Linux
.
See How to fix?
for Amazon-Linux:2
relevant fixed versions and status.
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
References
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104
- https://sqlite.org/forum/forumpost/5bcbf4571c
- https://sqlite.org/src/info/0e4e7a05c4204b47
- https://vuldb.com/?ctiid.248999
- https://vuldb.com/?id.248999
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
- https://security.netapp.com/advisory/ntap-20240112-0008/