SCIENTIFIC-LINUX-ERRATA Archives

August 2013

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Mon, 5 Aug 2013 19:03:49 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (68 lines)
Synopsis:          Moderate: nss and nspr security, bug fix, and enhancement update
Advisory ID:       SLSA-2013:1135-1
Issue Date:        2013-08-05
CVE Numbers:       CVE-2013-1620
                   CVE-2013-0791
--

It was discovered that NSS leaked timing information when decrypting
TLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites
were used. A remote attacker could possibly use this flaw to retrieve
plain text from the encrypted packets by using a TLS/SSL or DTLS server as
a padding oracle. (CVE-2013-1620)

An out-of-bounds memory read flaw was found in the way NSS decoded certain
certificates. If an application using NSS decoded a malformed certificate,
it could cause the application to crash. (CVE-2013-0791)

This update also fixes the following bugs:

* A defect in the FreeBL library implementation of the Diffie-Hellman (DH)
protocol previously caused Openswan to drop connections.

* A memory leak in the nssutil_ReadSecmodDB() function has been fixed.

In addition, the nss package has been upgraded to upstream version 3.14.3,
and the nspr package has been upgraded to upstream version 4.9.5. These
updates provide a number of bug fixes and enhancements over the previous
versions.

Note that while upstream NSS version 3.14 prevents the use of certificates
that have an MD5 signature, this erratum includes a patch that allows such
certificates by default. To prevent the use of certificates that have an
MD5 signature, set the "NSS_HASH_ALG_SUPPORT" environment variable to
"-MD5".

After installing this update, applications using NSS or NSPR must be
restarted for this update to take effect.
--

SL5
  x86_64
    nspr-4.9.5-1.el5_9.i386.rpm
    nspr-4.9.5-1.el5_9.x86_64.rpm
    nspr-debuginfo-4.9.5-1.el5_9.i386.rpm
    nspr-debuginfo-4.9.5-1.el5_9.x86_64.rpm
    nss-3.14.3-6.el5_9.i386.rpm
    nss-3.14.3-6.el5_9.x86_64.rpm
    nss-debuginfo-3.14.3-6.el5_9.i386.rpm
    nss-debuginfo-3.14.3-6.el5_9.x86_64.rpm
    nss-tools-3.14.3-6.el5_9.x86_64.rpm
    nspr-devel-4.9.5-1.el5_9.i386.rpm
    nspr-devel-4.9.5-1.el5_9.x86_64.rpm
    nss-devel-3.14.3-6.el5_9.i386.rpm
    nss-devel-3.14.3-6.el5_9.x86_64.rpm
    nss-pkcs11-devel-3.14.3-6.el5_9.i386.rpm
    nss-pkcs11-devel-3.14.3-6.el5_9.x86_64.rpm
  i386
    nspr-4.9.5-1.el5_9.i386.rpm
    nspr-debuginfo-4.9.5-1.el5_9.i386.rpm
    nss-3.14.3-6.el5_9.i386.rpm
    nss-debuginfo-3.14.3-6.el5_9.i386.rpm
    nss-tools-3.14.3-6.el5_9.i386.rpm
    nspr-devel-4.9.5-1.el5_9.i386.rpm
    nss-devel-3.14.3-6.el5_9.i386.rpm
    nss-pkcs11-devel-3.14.3-6.el5_9.i386.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2