Описание
ELSA-2015-1699: nss-softokn security update (MODERATE)
[3.14.3-23]
- Pick up upstream freebl patch for CVE-2015-2730
- Check for P == Q or P ==-Q before adding P and Q
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
nss-softokn
3.14.3-23.el6_7
nss-softokn-devel
3.14.3-23.el6_7
nss-softokn-freebl
3.14.3-23.el6_7
nss-softokn-freebl-devel
3.14.3-23.el6_7
Oracle Linux i686
nss-softokn
3.14.3-23.el6_7
nss-softokn-devel
3.14.3-23.el6_7
nss-softokn-freebl
3.14.3-23.el6_7
nss-softokn-freebl-devel
3.14.3-23.el6_7
Oracle Linux sparc64
nss-softokn
3.14.3-23.el6_7
nss-softokn-devel
3.14.3-23.el6_7
nss-softokn-freebl
3.14.3-23.el6_7
nss-softokn-freebl-devel
3.14.3-23.el6_7
Oracle Linux 7
Oracle Linux x86_64
nss-softokn
3.16.2.3-13.el7_1
nss-softokn-devel
3.16.2.3-13.el7_1
nss-softokn-freebl
3.16.2.3-13.el7_1
nss-softokn-freebl-devel
3.16.2.3-13.el7_1
Связанные CVE
Связанные уязвимости
Mozilla Network Security Services (NSS) before 3.19.1, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and other products, does not properly perform Elliptical Curve Cryptography (ECC) multiplications, which makes it easier for remote attackers to spoof ECDSA signatures via unspecified vectors.
Mozilla Network Security Services (NSS) before 3.19.1, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and other products, does not properly perform Elliptical Curve Cryptography (ECC) multiplications, which makes it easier for remote attackers to spoof ECDSA signatures via unspecified vectors.
Mozilla Network Security Services (NSS) before 3.19.1, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and other products, does not properly perform Elliptical Curve Cryptography (ECC) multiplications, which makes it easier for remote attackers to spoof ECDSA signatures via unspecified vectors.
Mozilla Network Security Services (NSS) before 3.19.1, as used in Mozi ...
Mozilla Network Security Services (NSS) before 3.19.1, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and other products, does not properly perform Elliptical Curve Cryptography (ECC) multiplications, which makes it easier for remote attackers to spoof ECDSA signatures via unspecified vectors.