Описание
ELSA-2014-1307: nss security update (IMPORTANT)
nss [3.16.2-7.0.1.el7_0]
- Added nss-vendor.patch to change vendor
[3.16.2-7]
- Resolves: Bug 1145433 - CVE-2014-1568
[3.16.2-6]
- Rolling back to commit e5fb6e476c179665976e906604496cbbb24f22a7
- Related: Bug 1145433
nss-softokn [3.16.2-3]
- Resolves: Bug 1145433 - CVE-2014-1568
nss-util [3.16.2-2]
- Resolves: bug 1145433 - CVE-2014-1568
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
nss
3.16.1-4.el5_11
nss-devel
3.16.1-4.el5_11
nss-pkcs11-devel
3.16.1-4.el5_11
nss-tools
3.16.1-4.el5_11
Oracle Linux x86_64
nss
3.16.1-4.el5_11
nss-devel
3.16.1-4.el5_11
nss-pkcs11-devel
3.16.1-4.el5_11
nss-tools
3.16.1-4.el5_11
Oracle Linux i386
nss
3.16.1-4.el5_11
nss-devel
3.16.1-4.el5_11
nss-pkcs11-devel
3.16.1-4.el5_11
nss-tools
3.16.1-4.el5_11
Oracle Linux 6
Oracle Linux x86_64
nss
3.16.1-7.0.1.el6_5
nss-devel
3.16.1-7.0.1.el6_5
nss-pkcs11-devel
3.16.1-7.0.1.el6_5
nss-softokn
3.14.3-12.el6_5
nss-softokn-devel
3.14.3-12.el6_5
nss-softokn-freebl
3.14.3-12.el6_5
nss-softokn-freebl-devel
3.14.3-12.el6_5
nss-sysinit
3.16.1-7.0.1.el6_5
nss-tools
3.16.1-7.0.1.el6_5
nss-util
3.16.1-2.el6_5
nss-util-devel
3.16.1-2.el6_5
Oracle Linux i686
nss
3.16.1-7.0.1.el6_5
nss-devel
3.16.1-7.0.1.el6_5
nss-pkcs11-devel
3.16.1-7.0.1.el6_5
nss-softokn
3.14.3-12.el6_5
nss-softokn-devel
3.14.3-12.el6_5
nss-softokn-freebl
3.14.3-12.el6_5
nss-softokn-freebl-devel
3.14.3-12.el6_5
nss-sysinit
3.16.1-7.0.1.el6_5
nss-tools
3.16.1-7.0.1.el6_5
nss-util
3.16.1-2.el6_5
nss-util-devel
3.16.1-2.el6_5
Oracle Linux 7
Oracle Linux x86_64
nss
3.16.2-7.0.1.el7_0
nss-devel
3.16.2-7.0.1.el7_0
nss-pkcs11-devel
3.16.2-7.0.1.el7_0
nss-softokn
3.16.2-2.el7_0
nss-softokn-devel
3.16.2-2.el7_0
nss-softokn-freebl
3.16.2-2.el7_0
nss-softokn-freebl-devel
3.16.2-2.el7_0
nss-sysinit
3.16.2-7.0.1.el7_0
nss-tools
3.16.2-7.0.1.el7_0
nss-util
3.16.2-2.el7_0
nss-util-devel
3.16.2-2.el7_0
Связанные CVE
Связанные уязвимости
Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before ...
Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.