Skip to navigation

Bug Fix Advisory nss bug fix update

Advisory: RHBA-2007:0113-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2007-03-14
Last updated on: 2007-03-14
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated nss packages that fix a bug which caused applications to fail in
FIPS mode are now available.

Network Security Services (NSS) is a set of libraries designed to
support cross-platform development of security-enabled client and
server applications. Applications built with NSS can support SSL v2
and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509
v3 certificates, and other security standards.

NSS uses a software integrity test to detect code corruption.
RPM transactions and system link optimization daemons (like prelink) can
change the library contents, causing the software integrity test to fail.
These updated packages prevent the failure on systems that use ext2 or ext3
on their /usr filesystem, by setting the immutable attribute on the
affected library files.

Users are advised to upgrade to these updated packages, which resolve
this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
nss-3.11.5-3.el5.src.rpm
File outdated by:  RHSA-2013:1861
    MD5: aab60e48824ccb6ba2af8a9f312a897c
 
IA-32:
nss-devel-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 91b312cba7351dce31a65b07efcde8c4
nss-pkcs11-devel-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 99973e6c0b0d5a078c6b53a282828e7c
 
x86_64:
nss-devel-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 91b312cba7351dce31a65b07efcde8c4
nss-devel-3.11.5-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 70b6b0199530963432c577ffb3ce1345
nss-pkcs11-devel-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 99973e6c0b0d5a078c6b53a282828e7c
nss-pkcs11-devel-3.11.5-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 45a7daa72f9ca24a40e915ead79a8704
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
nss-3.11.5-3.el5.src.rpm
File outdated by:  RHSA-2013:1861
    MD5: aab60e48824ccb6ba2af8a9f312a897c
 
IA-32:
nss-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: a0a0b51af499dfe5cccd172566b241f0
nss-devel-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 91b312cba7351dce31a65b07efcde8c4
nss-pkcs11-devel-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 99973e6c0b0d5a078c6b53a282828e7c
nss-tools-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 1cfae2f061e50c0a327598ea60ca78c1
 
IA-64:
nss-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: a0a0b51af499dfe5cccd172566b241f0
nss-3.11.5-3.el5.ia64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 1b0f063f4e6c25c16bb15e15a2db6361
nss-devel-3.11.5-3.el5.ia64.rpm
File outdated by:  RHSA-2013:1861
    MD5: a487ba29415827954b7ca25bd2769204
nss-pkcs11-devel-3.11.5-3.el5.ia64.rpm
File outdated by:  RHSA-2013:1861
    MD5: ccd669839aed8556dceed1455f0a272b
nss-tools-3.11.5-3.el5.ia64.rpm
File outdated by:  RHSA-2013:1861
    MD5: fee690d060b5e40bf8dead5a517e4755
 
PPC:
nss-3.11.5-3.el5.ppc.rpm
File outdated by:  RHSA-2013:1861
    MD5: 9e04c93d0d12b44d0e6fdebeaa1f1ff2
nss-3.11.5-3.el5.ppc64.rpm
File outdated by:  RHSA-2013:1861
    MD5: e7d9b7389a147ad5eac8a35ff974e662
nss-devel-3.11.5-3.el5.ppc.rpm
File outdated by:  RHSA-2013:1861
    MD5: 6a26726d352e256a2b898725d8a7ebbe
nss-devel-3.11.5-3.el5.ppc64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 8915fbda16f0d2aa50b03a0055bdef0e
nss-pkcs11-devel-3.11.5-3.el5.ppc.rpm
File outdated by:  RHSA-2013:1861
    MD5: 30b69d7869a076ad908b7e6323254c03
nss-pkcs11-devel-3.11.5-3.el5.ppc64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 70e5b8d79a321d44ff073e802bb71c7b
nss-tools-3.11.5-3.el5.ppc.rpm
File outdated by:  RHSA-2013:1861
    MD5: 3dd8751fdda123cc1386965a82c4b095
 
s390x:
nss-3.11.5-3.el5.s390.rpm
File outdated by:  RHSA-2013:1861
    MD5: df76fea693afc28d0ebe2d9605d46cfb
nss-3.11.5-3.el5.s390x.rpm
File outdated by:  RHSA-2013:1861
    MD5: b1b1b802ed90a604f14bc49453faa23b
nss-devel-3.11.5-3.el5.s390.rpm
File outdated by:  RHSA-2013:1861
    MD5: c5b629c22fe5cd65d41ee618e5febbd8
nss-devel-3.11.5-3.el5.s390x.rpm
File outdated by:  RHSA-2013:1861
    MD5: 72e234d729ea8b2ad7556eaaf916e19e
nss-pkcs11-devel-3.11.5-3.el5.s390.rpm
File outdated by:  RHSA-2013:1861
    MD5: 7df68e4133a10773d1309f756b09f266
nss-pkcs11-devel-3.11.5-3.el5.s390x.rpm
File outdated by:  RHSA-2013:1861
    MD5: df6136002f02019102f1e5b0b88f9db0
nss-tools-3.11.5-3.el5.s390x.rpm
File outdated by:  RHSA-2013:1861
    MD5: 7c7e3c6cc9c42492f5be741f6405f896
 
x86_64:
nss-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: a0a0b51af499dfe5cccd172566b241f0
nss-3.11.5-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 37661b77faced4af8a39cff7d3ae7478
nss-devel-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 91b312cba7351dce31a65b07efcde8c4
nss-devel-3.11.5-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 70b6b0199530963432c577ffb3ce1345
nss-pkcs11-devel-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 99973e6c0b0d5a078c6b53a282828e7c
nss-pkcs11-devel-3.11.5-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 45a7daa72f9ca24a40e915ead79a8704
nss-tools-3.11.5-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 2b9b17c03993183fcd98250801935897
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
nss-3.11.5-3.el5.src.rpm
File outdated by:  RHSA-2013:1861
    MD5: aab60e48824ccb6ba2af8a9f312a897c
 
IA-32:
nss-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: a0a0b51af499dfe5cccd172566b241f0
nss-tools-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: 1cfae2f061e50c0a327598ea60ca78c1
 
x86_64:
nss-3.11.5-3.el5.i386.rpm
File outdated by:  RHSA-2013:1861
    MD5: a0a0b51af499dfe5cccd172566b241f0
nss-3.11.5-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 37661b77faced4af8a39cff7d3ae7478
nss-tools-3.11.5-3.el5.x86_64.rpm
File outdated by:  RHSA-2013:1861
    MD5: 2b9b17c03993183fcd98250801935897
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

230546 - Can not enable NSS FIPS mode



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/