OVMSA-2015-0073

OVMSA-2015-0073 - nss security update

Type:SECURITY
Impact:MODERATE
Release Date:2015-06-26

Description


nss
[3.19.1-3.0.1]
- Added nss-vendor.patch to change vendor

[3.19.1-3]
- Additional NULL initialization.

[3.19.1-2]
- Updated the patch to keep old cipher suite order
- Resolves: Bug 1224449

[3.19.1-1]
- Rebase to nss-3.19.1
- Resolves: Bug 1224449

[3.18.0-5.3]
- On RHEL 6.x keep the TLS version defaults unchanged.

[3.18.0-5.2]
- Relax the requirement from pkcs11-devel to nss-softokn-freebl-devel
to allow same or newer.

[3.18.0-5.1]
- Require softokn build 22 to ensure runtime compatibility.
- Update to CKBI 2.4 from NSS 3.18.1 (the only change in NSS 3.18.1)

[3.18.0-5]
- Update and reeneable nss-646045.patch on account of the rebase
- Resolves: Bug 1207052 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL7.1]

[3.18.0-4]
- Fix shell syntax error in nss/tests/all.sh
- Resolves: Bug 1207052 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6]

[3.18.0-3]
- Restore a patch that had been mistakenly disabled
- Resolves: Bug 1207052 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6]

[3.18.0-2]
- Replace expired PayPal test certificate that breaks the build
- Resolves: Bug 1207052 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6]

[3.18.0-1]
- Rebase to NSS 3.18
- Resolves: Bug 1200900 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6]
- Keep the same cipher suite order as we had in NSS_3_15_3_RTM
- Resolves: Bug 1202488 - openldap-2.4.23-34.el6_5.1.i686 fails after updating nss to nss-3.16.1-4.el6_5.i686
- Resolves: Bug 1182902 - rhel65 ns-slapd crash, segfault error 4 in libnss3.so in PK11_DoesMechanism at pk11slot.c:1824

nss-util
[3.19.0-1]
- Rebase to nss-3.19.1
- Resolves: Bug 1224449

[3.18.0-1]
- Resolves: - Bug 1205064 - [RHEL6.6] nss-util 3.18 rebase required for firefox 38 ESR


Related CVEs


CVE-2015-4000

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.3 (x86_64) nss-3.19.1-3.0.1.el6_6.src.rpm5f0184b8c9cf77999254b462a2c921507ff0c907b692afe8e210514bc0e3088cOVMSA-2023-0014ovm3_x86_64_3.3_patch
nss-util-3.19.1-1.el6_6.src.rpm47ea091a12a50200c0ee998bded155950530639600bf75b560b8c75de39b246cOVMBA-2019-0058ovm3_x86_64_3.3_patch
nss-3.19.1-3.0.1.el6_6.x86_64.rpm4a7e98ceb77478bc32c01bd4f12454e4412b64390fd8f0848a2a66e5d5e6cdb6OVMSA-2023-0014ovm3_x86_64_3.3_patch
nss-sysinit-3.19.1-3.0.1.el6_6.x86_64.rpmeccc96bdd76159eb38e189d046cb8961cd8297ec12a66f3d19f13aa6efc2d6c2OVMSA-2023-0014ovm3_x86_64_3.3_patch
nss-tools-3.19.1-3.0.1.el6_6.x86_64.rpmfca1f9b4254a1189cbac3afa7527a01b8ab8267eb711db62268438aa291dcf61OVMSA-2023-0014ovm3_x86_64_3.3_patch
nss-util-3.19.1-1.el6_6.x86_64.rpmd6427111fda0ffa3bff466532684edcd7624ad65a85386c3d3783fd10f78b250OVMBA-2019-0058ovm3_x86_64_3.3_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete