Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0862

Опубликовано: 11 фев. 2011
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2010-0862: nss security update (LOW)

nss:

[3.12.8-1.0.1.el6]

  • Update expired PayPalEE.cert to fix build failure
  • Use blank image instead of clean.gif in nss-3.12.8-stripped.tar.bz2

[3.12.8-1]

  • Update to 3.12.8

nss-softokn:

[3.12.8-1]

  • Update to 3.12.8

nss-util:

[3.12.7-1]

  • Update to 3.12.7

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

nss

3.12.8-1.0.1.el6_0

nss-devel

3.12.8-1.0.1.el6_0

nss-pkcs11-devel

3.12.8-1.0.1.el6_0

nss-softokn

3.12.8-1.el6_0

nss-softokn-devel

3.12.8-1.el6_0

nss-softokn-freebl

3.12.8-1.el6_0

nss-sysinit

3.12.8-1.0.1.el6_0

nss-tools

3.12.8-1.0.1.el6_0

nss-util

3.12.8-1.el6_0

nss-util-devel

3.12.8-1.el6_0

Oracle Linux i686

nss

3.12.8-1.0.1.el6_0

nss-devel

3.12.8-1.0.1.el6_0

nss-pkcs11-devel

3.12.8-1.0.1.el6_0

nss-softokn

3.12.8-1.el6_0

nss-softokn-devel

3.12.8-1.el6_0

nss-softokn-freebl

3.12.8-1.el6_0

nss-sysinit

3.12.8-1.0.1.el6_0

nss-tools

3.12.8-1.0.1.el6_0

nss-util

3.12.8-1.el6_0

nss-util-devel

3.12.8-1.el6_0

Связанные CVE

Связанные уязвимости

ubuntu
больше 14 лет назад

Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

redhat
почти 15 лет назад

Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

nvd
больше 14 лет назад

Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

debian
больше 14 лет назад

Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird bef ...

github
около 3 лет назад

Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.