Описание
ELSA-2009-1186: nspr and nss security, bug fix, and enhancement update (CRITICAL)
nspr: [4.7.4-1.el5_3.1]
- create z-stream version
[4.7.4-1]
- Update to NSPR 4.7.4
nss: [3.12.3.99.3-1.0.1.el5_3.2]
- Update clean.gif in the nss-3.12.3.99.3-stripped.tar.bz2 tarball
[3.12.3.99.3-1.el5_3.2]
- adjust ssl cipher count constant (bug 505650)
[3.12.3.99.3-1.el5_3.1]
- create z-stream version
[3.12.3.99.3-1]
- updated to NSS_3_12_4_FIPS1_WITH_CKBI_1_75
[3.12.3-5]
- updated patch to seckey
[3.12.3-4]
- add a patch to seckey
[3.12.3-3]
- remove references to SEED
[3.12.3-2]
- update to NSS 3.12.3
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
nspr
4.7.4-1.el5_3.1
nspr-devel
4.7.4-1.el5_3.1
nss
3.12.3.99.3-1.0.1.el5_3.2
nss-devel
3.12.3.99.3-1.0.1.el5_3.2
nss-pkcs11-devel
3.12.3.99.3-1.0.1.el5_3.2
nss-tools
3.12.3.99.3-1.0.1.el5_3.2
Oracle Linux x86_64
nspr
4.7.4-1.el5_3.1
nspr-devel
4.7.4-1.el5_3.1
nss
3.12.3.99.3-1.0.1.el5_3.2
nss-devel
3.12.3.99.3-1.0.1.el5_3.2
nss-pkcs11-devel
3.12.3.99.3-1.0.1.el5_3.2
nss-tools
3.12.3.99.3-1.0.1.el5_3.2
Oracle Linux i386
nspr
4.7.4-1.el5_3.1
nspr-devel
4.7.4-1.el5_3.1
nss
3.12.3.99.3-1.0.1.el5_3.2
nss-devel
3.12.3.99.3-1.0.1.el5_3.2
nss-pkcs11-devel
3.12.3.99.3-1.0.1.el5_3.2
nss-tools
3.12.3.99.3-1.0.1.el5_3.2
Связанные CVE
Связанные уязвимости
ELSA-2009-1184: nspr and nss security and bug fix update (CRITICAL)
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before ...