Synopsis:          Critical: nss security update
Advisory ID:       SLSA-2016:0371-1
Issue Date:        2016-03-09
CVE Numbers:       CVE-2016-1950
--

A heap-based buffer overflow flaw was found in the way NSS parsed certain
ASN.1 structures. An attacker could use this flaw to create a specially
crafted certificate which, when parsed by NSS, could cause it to crash, or
execute arbitrary code, using the permissions of the user running an
application compiled against the NSS library. (CVE-2016-1950)

For the update to take effect, all applications linked to the nss library
must be restarted, or the system rebooted.
--

SL5
  x86_64
    nss-3.19.1-4.el5_11.i386.rpm
    nss-3.19.1-4.el5_11.x86_64.rpm
    nss-debuginfo-3.19.1-4.el5_11.i386.rpm
    nss-debuginfo-3.19.1-4.el5_11.x86_64.rpm
    nss-tools-3.19.1-4.el5_11.x86_64.rpm
    nss-devel-3.19.1-4.el5_11.i386.rpm
    nss-devel-3.19.1-4.el5_11.x86_64.rpm
    nss-pkcs11-devel-3.19.1-4.el5_11.i386.rpm
    nss-pkcs11-devel-3.19.1-4.el5_11.x86_64.rpm
  i386
    nss-3.19.1-4.el5_11.i386.rpm
    nss-debuginfo-3.19.1-4.el5_11.i386.rpm
    nss-tools-3.19.1-4.el5_11.i386.rpm
    nss-devel-3.19.1-4.el5_11.i386.rpm
    nss-pkcs11-devel-3.19.1-4.el5_11.i386.rpm

- Scientific Linux Development Team