OVMSA-2016-0042

OVMSA-2016-0042 - nss nss-util, and nspr security update

Type:SECURITY
Severity:MODERATE
Release Date:2016-04-05

Description


nss
[3.21.0-0.3.0.1]
- Added nss-vendor.patch to change vendor

[3.21.0-0.3]
- Ensure all ssl.sh tests are executed

[3.21.0-0.2]
- Ensure abi compatibility

[3.21.0-0.1]
- Rebase to NSS-3.21

nss-util
[3.21.0-0.3]
- Rebase RHEL 6.7.z to NSS-util 3.21 in preparation for Firefox 45
- Resolves: Bug 1299874
- Update upstream patch for CVE-2016-1950

nspr
[4.11.0-0.1]
- Rebase to NSPR 4.11


Related CVEs


CVE-2016-1978
CVE-2016-1979

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.3 (x86_64) nspr-4.11.0-0.1.el6_7.src.rpm90e8a99e4572fab3ac16197f1046c361OVMBA-2019-0058
nss-3.21.0-0.3.0.1.el6_7.src.rpme6b1cf8bf3f52020a1306c72dd46f863OVMBA-2019-0058
nss-util-3.21.0-0.3.el6_7.src.rpmd35d04f68adfc394733f76cdbbb2b656OVMBA-2019-0058
nspr-4.11.0-0.1.el6_7.x86_64.rpmde7e6a09b25f6ee8a22eb6e3a8a2340dOVMBA-2019-0058
nss-3.21.0-0.3.0.1.el6_7.x86_64.rpm4bbf5fff716d832182532732874cdd86OVMBA-2019-0058
nss-sysinit-3.21.0-0.3.0.1.el6_7.x86_64.rpm5e5ad21d044cd327444fffc365a72627OVMBA-2019-0058
nss-tools-3.21.0-0.3.0.1.el6_7.x86_64.rpmc29e14b0e19c3b1cb5b35d5e1e0667ffOVMBA-2019-0058
nss-util-3.21.0-0.3.el6_7.x86_64.rpm1f7943b5657cc2b62facc42ac874d54bOVMBA-2019-0058
Oracle VM 3.4 (x86_64) nspr-4.11.0-0.1.el6_7.src.rpm90e8a99e4572fab3ac16197f1046c361OVMBA-2019-0058
nss-3.21.0-0.3.0.1.el6_7.src.rpme6b1cf8bf3f52020a1306c72dd46f863OVMBA-2019-0058
nss-util-3.21.0-0.3.el6_7.src.rpmd35d04f68adfc394733f76cdbbb2b656OVMBA-2019-0058
nspr-4.11.0-0.1.el6_7.x86_64.rpmde7e6a09b25f6ee8a22eb6e3a8a2340dOVMBA-2019-0058
nss-3.21.0-0.3.0.1.el6_7.x86_64.rpm4bbf5fff716d832182532732874cdd86OVMBA-2019-0058
nss-sysinit-3.21.0-0.3.0.1.el6_7.x86_64.rpm5e5ad21d044cd327444fffc365a72627OVMBA-2019-0058
nss-tools-3.21.0-0.3.0.1.el6_7.x86_64.rpmc29e14b0e19c3b1cb5b35d5e1e0667ffOVMBA-2019-0058
nss-util-3.21.0-0.3.el6_7.x86_64.rpm1f7943b5657cc2b62facc42ac874d54bOVMBA-2019-0058



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete