Search for packages
Package details: pkg:deb/debian/nspr@2:4.9.2-1%2Bdeb7u3
purl pkg:deb/debian/nspr@2:4.9.2-1%2Bdeb7u3
Next non-vulnerable version 2:4.12-1+debu8u1
Latest non-vulnerable version 2:4.12-1+debu8u1
Risk 4.5
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-bxjv-m89h-xfbp
Aliases:
CVE-2013-5607
Mozilla has updated the version of Network Security Services (NSS) library used in Mozilla projects to NSS 3.15.3 with the exception of ESR17-based releases, which have been updated to NSS 3.14.5. This addresses several moderate to critical rated networking security issues.Google developer Andrew Tinits reported a potentially exploitable buffer overflow that was fixed in both NSS 3.15.3 and NSS 3.14.5.
2:4.10.7-1
Affected by 2 other vulnerabilities.
VCID-cua7-h6xk-b7e6
Aliases:
CVE-2014-1545
Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team reported an out of bounds write in the Netscape Portable Runtime (NSPR) leading to a potentially exploitable crash or code execution. This issue is fixed in NSPR version 4.10.6. This NSPR flaw was not exposed to web content in any shipped version of Firefox.
2:4.10.7-1
Affected by 2 other vulnerabilities.
VCID-wh2u-5ttv-tbez
Aliases:
CVE-2015-7183
Mozilla engineers Tyson Smith and David Keeler reported a use-after-poison and buffer overflow in the ASN.1 decoder in Network Security Services (NSS). These issues were in octet string parsing and were found through fuzzing and code inspection. If these issues were triggered, they would lead to a potentially exploitable crash. These issues were fixed in NSS version 3.19.2.1 and 3.19.4, shipped in Firefox and Firefox ESR, respectively, as well as NSS 3.20.1.Google security engineer Ryan Sleevi reported an integer overflow in the Netscape Portable Runtime (NSPR) due to a lack of checks during memory allocation. This leads to a potentially exploitable crash. This issue is fixed in NSPR 4.10.10. The NSPR library is a required component of NSS.
2:4.12-1+debu8u1
Affected by 0 other vulnerabilities.
VCID-zqyw-71ug-e3gt
Aliases:
CVE-2016-1951
2:4.12-1+debu8u1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-bxjv-m89h-xfbp Mozilla has updated the version of Network Security Services (NSS) library used in Mozilla projects to NSS 3.15.3 with the exception of ESR17-based releases, which have been updated to NSS 3.14.5. This addresses several moderate to critical rated networking security issues.Google developer Andrew Tinits reported a potentially exploitable buffer overflow that was fixed in both NSS 3.15.3 and NSS 3.14.5. CVE-2013-5607
VCID-cua7-h6xk-b7e6 Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team reported an out of bounds write in the Netscape Portable Runtime (NSPR) leading to a potentially exploitable crash or code execution. This issue is fixed in NSPR version 4.10.6. This NSPR flaw was not exposed to web content in any shipped version of Firefox. CVE-2014-1545
VCID-wh2u-5ttv-tbez Mozilla engineers Tyson Smith and David Keeler reported a use-after-poison and buffer overflow in the ASN.1 decoder in Network Security Services (NSS). These issues were in octet string parsing and were found through fuzzing and code inspection. If these issues were triggered, they would lead to a potentially exploitable crash. These issues were fixed in NSS version 3.19.2.1 and 3.19.4, shipped in Firefox and Firefox ESR, respectively, as well as NSS 3.20.1.Google security engineer Ryan Sleevi reported an integer overflow in the Netscape Portable Runtime (NSPR) due to a lack of checks during memory allocation. This leads to a potentially exploitable crash. This issue is fixed in NSPR 4.10.10. The NSPR library is a required component of NSS. CVE-2015-7183

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T19:33:35.274546+00:00 Debian Oval Importer Affected by VCID-wh2u-5ttv-tbez https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:45:11.160594+00:00 Debian Oval Importer Affected by VCID-cua7-h6xk-b7e6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:34:13.768920+00:00 Debian Oval Importer Affected by VCID-bxjv-m89h-xfbp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:47:29.071847+00:00 Debian Oval Importer Affected by VCID-zqyw-71ug-e3gt https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T10:31:37.825621+00:00 Debian Oval Importer Affected by VCID-zqyw-71ug-e3gt https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:10:56.636139+00:00 Debian Oval Importer Affected by VCID-wh2u-5ttv-tbez https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T09:43:56.541496+00:00 Debian Oval Importer Fixing VCID-cua7-h6xk-b7e6 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:36:16.956243+00:00 Debian Oval Importer Fixing VCID-wh2u-5ttv-tbez https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:27:19.481665+00:00 Debian Oval Importer Fixing VCID-bxjv-m89h-xfbp https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0