Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Pat Riehecky <riehecky-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Moderate: nss and nspr on SL5.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Monday 5th August 2013 19:03:49 UTC (over 3 years ago)
Synopsis:          Moderate: nss and nspr security, bug fix, and
enhancement update
Advisory ID:       SLSA-2013:1135-1
Issue Date:        2013-08-05
CVE Numbers:       CVE-2013-1620
                   CVE-2013-0791
--

It was discovered that NSS leaked timing information when decrypting
TLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites
were used. A remote attacker could possibly use this flaw to retrieve
plain text from the encrypted packets by using a TLS/SSL or DTLS server as
a padding oracle. (CVE-2013-1620)

An out-of-bounds memory read flaw was found in the way NSS decoded certain
certificates. If an application using NSS decoded a malformed certificate,
it could cause the application to crash. (CVE-2013-0791)

This update also fixes the following bugs:

* A defect in the FreeBL library implementation of the Diffie-Hellman (DH)
protocol previously caused Openswan to drop connections.

* A memory leak in the nssutil_ReadSecmodDB() function has been fixed.

In addition, the nss package has been upgraded to upstream version 3.14.3,
and the nspr package has been upgraded to upstream version 4.9.5. These
updates provide a number of bug fixes and enhancements over the previous
versions.

Note that while upstream NSS version 3.14 prevents the use of certificates
that have an MD5 signature, this erratum includes a patch that allows such
certificates by default. To prevent the use of certificates that have an
MD5 signature, set the "NSS_HASH_ALG_SUPPORT" environment variable to
"-MD5".

After installing this update, applications using NSS or NSPR must be
restarted for this update to take effect.
--

SL5
  x86_64
    nspr-4.9.5-1.el5_9.i386.rpm
    nspr-4.9.5-1.el5_9.x86_64.rpm
    nspr-debuginfo-4.9.5-1.el5_9.i386.rpm
    nspr-debuginfo-4.9.5-1.el5_9.x86_64.rpm
    nss-3.14.3-6.el5_9.i386.rpm
    nss-3.14.3-6.el5_9.x86_64.rpm
    nss-debuginfo-3.14.3-6.el5_9.i386.rpm
    nss-debuginfo-3.14.3-6.el5_9.x86_64.rpm
    nss-tools-3.14.3-6.el5_9.x86_64.rpm
    nspr-devel-4.9.5-1.el5_9.i386.rpm
    nspr-devel-4.9.5-1.el5_9.x86_64.rpm
    nss-devel-3.14.3-6.el5_9.i386.rpm
    nss-devel-3.14.3-6.el5_9.x86_64.rpm
    nss-pkcs11-devel-3.14.3-6.el5_9.i386.rpm
    nss-pkcs11-devel-3.14.3-6.el5_9.x86_64.rpm
  i386
    nspr-4.9.5-1.el5_9.i386.rpm
    nspr-debuginfo-4.9.5-1.el5_9.i386.rpm
    nss-3.14.3-6.el5_9.i386.rpm
    nss-debuginfo-3.14.3-6.el5_9.i386.rpm
    nss-tools-3.14.3-6.el5_9.i386.rpm
    nspr-devel-4.9.5-1.el5_9.i386.rpm
    nss-devel-3.14.3-6.el5_9.i386.rpm
    nss-pkcs11-devel-3.14.3-6.el5_9.i386.rpm

- Scientific Linux Development Team
 
CD: 2ms