Описание
ELSA-2010-0862: nss security update (LOW)
nss:
[3.12.8-1.0.1.el6]
- Update expired PayPalEE.cert to fix build failure
- Use blank image instead of clean.gif in nss-3.12.8-stripped.tar.bz2
[3.12.8-1]
- Update to 3.12.8
nss-softokn:
[3.12.8-1]
- Update to 3.12.8
nss-util:
[3.12.7-1]
- Update to 3.12.7
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
nss
3.12.8-1.0.1.el6_0
nss-devel
3.12.8-1.0.1.el6_0
nss-pkcs11-devel
3.12.8-1.0.1.el6_0
nss-softokn
3.12.8-1.el6_0
nss-softokn-devel
3.12.8-1.el6_0
nss-softokn-freebl
3.12.8-1.el6_0
nss-sysinit
3.12.8-1.0.1.el6_0
nss-tools
3.12.8-1.0.1.el6_0
nss-util
3.12.8-1.el6_0
nss-util-devel
3.12.8-1.el6_0
Oracle Linux i686
nss
3.12.8-1.0.1.el6_0
nss-devel
3.12.8-1.0.1.el6_0
nss-pkcs11-devel
3.12.8-1.0.1.el6_0
nss-softokn
3.12.8-1.el6_0
nss-softokn-devel
3.12.8-1.el6_0
nss-softokn-freebl
3.12.8-1.el6_0
nss-sysinit
3.12.8-1.0.1.el6_0
nss-tools
3.12.8-1.0.1.el6_0
nss-util
3.12.8-1.el6_0
nss-util-devel
3.12.8-1.el6_0
Связанные CVE
Связанные уязвимости
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird bef ...
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.