Skip to navigation

Bug Fix Advisory nss bug fix update

Advisory: RHBA-2010:0526-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-07-12
Last updated on: 2010-07-12
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated nss packages that resolve an issue are now available.

NSS is a set of libraries designed to support cross-platform development of
security-enabled client and server applications. Applications built with NSS can
support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509
v3 certificates, and other security standards.

These updated nss packages fix the following bug:

* a header, 'prlink.h', caused compiler warnings when it was included in an
application built with the strict prototype checking enabled (i.e. when
"-Wstrict-prototypes" was included in the 'CFLAGS'). If such warnings were
treated as errors in the compiler flags (i.e. if "-Werror" was used), the
affected application would not compile. The affected applications did not, in
fact, need 'prlink.h', they were including it indirectly via another header.
This update fixes the header so that it does not expose the faulty header and
enables nss client software to build with strict prototype checking enabled, as
expected. (BZ#587546)

All users of NSS are advised to upgrade to these updated packages, which resolve
this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
nss-3.12.6-2.el5_5.src.rpm
File outdated by:  RHSA-2013:1861
    MD5: 6871ee94fddb81a6a60de890d0ca7d52
SHA-256: f4b38b120086a62f78379cb273ec9f0a215638151474dfa661a61c9441cd32bd
 
IA-32:
nss-devel-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 56ce1379085f63fa15c3f6c99a9c6fc4
SHA-256: 496584b69e4b85d5b8857305568c52bc8fd73edd77ac4653f924c3d89d12d701
nss-pkcs11-devel-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 85085da7c23b5326a1d76ff00343ebc0
SHA-256: 8b2b6fbf9196da1d9a10cadb50b833a8f65f4c8cfa9337ac3e941c6aa4b29349
 
x86_64:
nss-devel-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 56ce1379085f63fa15c3f6c99a9c6fc4
SHA-256: 496584b69e4b85d5b8857305568c52bc8fd73edd77ac4653f924c3d89d12d701
nss-devel-3.12.6-2.el5_5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 1ed3d39ef2a96eb2b126bb139ab60e22
SHA-256: cd4daa95b90de7bd2a1c39edaa3ad9add8a032a35fae747a54b41ef7ff5b5c8e
nss-pkcs11-devel-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 85085da7c23b5326a1d76ff00343ebc0
SHA-256: 8b2b6fbf9196da1d9a10cadb50b833a8f65f4c8cfa9337ac3e941c6aa4b29349
nss-pkcs11-devel-3.12.6-2.el5_5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 47911d095ea55f50eac2321fcc6b9065
SHA-256: 37022409ad9da23cf8709d32b1ca7c5b66aebfd589167317b0dee7f0d0733dc1
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
nss-3.12.6-2.el5_5.src.rpm
File outdated by:  RHSA-2013:1861
    MD5: 6871ee94fddb81a6a60de890d0ca7d52
SHA-256: f4b38b120086a62f78379cb273ec9f0a215638151474dfa661a61c9441cd32bd
 
IA-32:
nss-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: ff14df50a8f491b4c5b35ab99d1f6786
SHA-256: a44bf5612339b639704da49bcc26a8de1f496b4dd5b07ac1ec494ab50c18a278
nss-devel-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 56ce1379085f63fa15c3f6c99a9c6fc4
SHA-256: 496584b69e4b85d5b8857305568c52bc8fd73edd77ac4653f924c3d89d12d701
nss-pkcs11-devel-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 85085da7c23b5326a1d76ff00343ebc0
SHA-256: 8b2b6fbf9196da1d9a10cadb50b833a8f65f4c8cfa9337ac3e941c6aa4b29349
nss-tools-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: c36297c187643cd3ad236b638feb3113
SHA-256: babfb7911940e1942cba56f55b49d1ae9c86958615f6be18220419dd1c7f5a79
 
IA-64:
nss-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: ff14df50a8f491b4c5b35ab99d1f6786
SHA-256: a44bf5612339b639704da49bcc26a8de1f496b4dd5b07ac1ec494ab50c18a278
nss-3.12.6-2.el5_5.ia64.rpm
File outdated by:  RHSA-2013:1861
    MD5: f8b54ed72c028ff80f92c0dc0b6dcc9d
SHA-256: c0df3964a79107ca416f657992a6debc38bb5b86909126792b67e601e7edcff3
nss-devel-3.12.6-2.el5_5.ia64.rpm
File outdated by:  RHSA-2013:1861
    MD5: daf19129ecb6723a91465fa90af2d9e5
SHA-256: 068326ee0f340a6367c986f49278d7d8c535907d0b972205c402d97fe8a28638
nss-pkcs11-devel-3.12.6-2.el5_5.ia64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 170c1521d166a465bdc1ffcc3f8ae8e5
SHA-256: 64d25747f3bef64b4987ee77494090503c23f297dec6d811a907aeca15ae8fa3
nss-tools-3.12.6-2.el5_5.ia64.rpm
File outdated by:  RHSA-2013:1861
    MD5: bfe647e54ab6023d97dd1e5018a7e8c0
SHA-256: 7f08ee01bcbe92fd5ebf0b1be7f08f415358248a9d3853e91eb796679ab5afb5
 
PPC:
nss-3.12.6-2.el5_5.ppc.rpm
File outdated by:  RHSA-2013:1861
    MD5: 77e939f6d805dba99ebd70f100138d57
SHA-256: ef83bc3c36787b2391fe19a7a2b571ed8fc84a53135ecafa1ce8f026817d917d
nss-3.12.6-2.el5_5.ppc64.rpm
File outdated by:  RHSA-2013:1861
    MD5: cc72e0738cf4beec4a44746bb9e3e626
SHA-256: 496cc2d4fed60fd71250a427e9bfa4d4116277a3b256a4e5599a69ec9fab689d
nss-devel-3.12.6-2.el5_5.ppc.rpm
File outdated by:  RHSA-2013:1861
    MD5: a548d122bb636a0d3d7517242e9c14e1
SHA-256: bcb3209fd7ac64f822672a37bd187e26f0814ea90f9cd6df7fd37bc8fc824402
nss-devel-3.12.6-2.el5_5.ppc64.rpm
File outdated by:  RHSA-2013:1861
    MD5: c3552a6c75666e7c5c98e9da668c3b2c
SHA-256: b68d69841c7eeb109713cb483705d33a402040183c9289d0bc196a822b3ff983
nss-pkcs11-devel-3.12.6-2.el5_5.ppc.rpm
File outdated by:  RHSA-2013:1861
    MD5: 15a9e2002b001e02c25c197d52ca01fe
SHA-256: ce387bbc3b9d6307e678786d27f572aafa7c30fcb866114d0e3a342b362ee190
nss-pkcs11-devel-3.12.6-2.el5_5.ppc64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 74ec7803d96b8f9bdca1eeb23066d398
SHA-256: d607685b897a5df5c0c1033ca414f1ede4ade308eb115318f15a3aeb074990da
nss-tools-3.12.6-2.el5_5.ppc.rpm
File outdated by:  RHSA-2013:1861
    MD5: c2e35ce92733119448e82732daaf8057
SHA-256: 50795f5724a8c70ed864f51a1bd86b829d9abd6ad24f069668bf7f2cd0d07403
 
s390x:
nss-3.12.6-2.el5_5.s390.rpm
File outdated by:  RHSA-2013:1861
    MD5: 2c71e843ecd562d46382525e942cfde9
SHA-256: 8de5895d2924be27dc51a92498ef5e686cb6b7ecd477ba0be5cac17ccf3ddf59
nss-3.12.6-2.el5_5.s390x.rpm
File outdated by:  RHSA-2013:1861
    MD5: bca50fa8076c37fca4faf0ae3e37632b
SHA-256: f00f3aa8423eeba8a09c7f7a983f3e0de4a96be8d163cb394af4edecc8c7d209
nss-devel-3.12.6-2.el5_5.s390.rpm
File outdated by:  RHSA-2013:1861
    MD5: f958fb6f39355f49286d3dcd9c4311f6
SHA-256: f5aef814c8a71d6bb7d7431a3e972543fc46c483971066fd49366a8cf30cfe0c
nss-devel-3.12.6-2.el5_5.s390x.rpm
File outdated by:  RHSA-2013:1861
    MD5: d99e8206bc6c4c10f6f73fb708c169ae
SHA-256: 60e7bb2f0484ab16ebda0cdc3d96236ac8f8cc4288cf8dd96d5b28629cc866be
nss-pkcs11-devel-3.12.6-2.el5_5.s390.rpm
File outdated by:  RHSA-2013:1861
    MD5: 29439690914b8e6ec0598e99ce743fb8
SHA-256: 2808b2a670bf8bf11444019c6a6059003f48cdd83a73299c6f8d2b368e6f3bcd
nss-pkcs11-devel-3.12.6-2.el5_5.s390x.rpm
File outdated by:  RHSA-2013:1861
    MD5: b37141e4931c00beb473e9fe9b67cf9b
SHA-256: 29aec63b25f85b332bebb95dbb540e1129351a927949533fe7551b6f9e4c8cf5
nss-tools-3.12.6-2.el5_5.s390x.rpm
File outdated by:  RHSA-2013:1861
    MD5: ae7d819c360fcb58a6807f392dbf5d86
SHA-256: 271de2c7f44d1e4000df70545ed47da998774203feeb8e2bbe77ca0aac3f6f99
 
x86_64:
nss-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: ff14df50a8f491b4c5b35ab99d1f6786
SHA-256: a44bf5612339b639704da49bcc26a8de1f496b4dd5b07ac1ec494ab50c18a278
nss-3.12.6-2.el5_5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 0578f4465ca80104575a11f2408400eb
SHA-256: 38b6f072440001daf1a998326873022512007cd8beb5b9f63d3407e4bde8e964
nss-devel-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 56ce1379085f63fa15c3f6c99a9c6fc4
SHA-256: 496584b69e4b85d5b8857305568c52bc8fd73edd77ac4653f924c3d89d12d701
nss-devel-3.12.6-2.el5_5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 1ed3d39ef2a96eb2b126bb139ab60e22
SHA-256: cd4daa95b90de7bd2a1c39edaa3ad9add8a032a35fae747a54b41ef7ff5b5c8e
nss-pkcs11-devel-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 85085da7c23b5326a1d76ff00343ebc0
SHA-256: 8b2b6fbf9196da1d9a10cadb50b833a8f65f4c8cfa9337ac3e941c6aa4b29349
nss-pkcs11-devel-3.12.6-2.el5_5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 47911d095ea55f50eac2321fcc6b9065
SHA-256: 37022409ad9da23cf8709d32b1ca7c5b66aebfd589167317b0dee7f0d0733dc1
nss-tools-3.12.6-2.el5_5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: ed759870e29bb67636ecab0831701102
SHA-256: 317640cd2cb4d529cfae2170f787b31612239c7ee241831980cf00cb2ddfd501
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
nss-3.12.6-2.el5_5.src.rpm
File outdated by:  RHSA-2013:1861
    MD5: 6871ee94fddb81a6a60de890d0ca7d52
SHA-256: f4b38b120086a62f78379cb273ec9f0a215638151474dfa661a61c9441cd32bd
 
IA-32:
nss-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: ff14df50a8f491b4c5b35ab99d1f6786
SHA-256: a44bf5612339b639704da49bcc26a8de1f496b4dd5b07ac1ec494ab50c18a278
nss-tools-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: c36297c187643cd3ad236b638feb3113
SHA-256: babfb7911940e1942cba56f55b49d1ae9c86958615f6be18220419dd1c7f5a79
 
x86_64:
nss-3.12.6-2.el5_5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: ff14df50a8f491b4c5b35ab99d1f6786
SHA-256: a44bf5612339b639704da49bcc26a8de1f496b4dd5b07ac1ec494ab50c18a278
nss-3.12.6-2.el5_5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 0578f4465ca80104575a11f2408400eb
SHA-256: 38b6f072440001daf1a998326873022512007cd8beb5b9f63d3407e4bde8e964
nss-tools-3.12.6-2.el5_5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: ed759870e29bb67636ecab0831701102
SHA-256: 317640cd2cb4d529cfae2170f787b31612239c7ee241831980cf00cb2ddfd501
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

587546 - prlink.h gives warning with -Wstrict-prototypes



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/