Skip to navigation

Bug Fix Advisory mod_nss bug fix update

Advisory: RHBA-2012:0394-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-03-19
Last updated on: 2012-03-19
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated mod_nss package that fixes two bugs is now available for Red Hat
Enterprise Linux 6.

The mod_nss module provides strong cryptography for the Apache HTTP Server via
the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols,
using the Network Security Services (NSS) security library.

This update fixes the following bugs:

* The RHBA-2011:1656 errata advisory released a patch that fixed a problem of
mod_nss crashing when clearing its SSL cache on startup without the NSS library
initialized. However, that patch placed the fix in the improper location in the
code, which caused a file descriptor leak in the Apache httpd daemon. With this
update, the necessary fix has been relocated to the appropriate location in the
code so that the problem is fixed and the file descriptor leak no longer occurs.
(BZ#800270, BZ#800271)

All users of mod_nss are advised to upgrade to this updated package, which fixes
these bugs.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
mod_nss-1.0.8-14.el6_2.src.rpm
File outdated by:  RHSA-2013:1779
    MD5: 9cf05108228849a731d679a7aac3cff6
SHA-256: cceebaf6344bcea8db27706ca63ce83d224378fe55dd2ae9732d2780e03f2f21
 
IA-32:
mod_nss-1.0.8-14.el6_2.i686.rpm
File outdated by:  RHSA-2013:1779
    MD5: 96f9a3a59dc6369c108394daa6987113
SHA-256: b0b59567b9a60018c6dfdd07ff8f22011b0fe583bb24b6d2a84e5ea3823b2ea6
mod_nss-debuginfo-1.0.8-14.el6_2.i686.rpm
File outdated by:  RHSA-2013:1779
    MD5: 5aa79346ebf445e7882b79db101dcbf6
SHA-256: 41d7a18b7683bb971348ef929380dbc67f2ac0cc32158e0091c5a0d847927cfa
 
x86_64:
mod_nss-1.0.8-14.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1779
    MD5: 9e402b11aa9b168a6d339659afd4620c
SHA-256: 125dc25732cbd19dce4ee0030fb63d5a633964740bc04c9f5cf566f7974c4723
mod_nss-debuginfo-1.0.8-14.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1779
    MD5: dcd4d9c1860ead0df7da2d5fbe46a0c1
SHA-256: 4efae4f84f1cddae284dc830936edf0260934cc0393a07d99cb89756e80a4b17
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
mod_nss-1.0.8-14.el6_2.src.rpm
File outdated by:  RHSA-2013:1779
    MD5: 9cf05108228849a731d679a7aac3cff6
SHA-256: cceebaf6344bcea8db27706ca63ce83d224378fe55dd2ae9732d2780e03f2f21
 
x86_64:
mod_nss-1.0.8-14.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1779
    MD5: 9e402b11aa9b168a6d339659afd4620c
SHA-256: 125dc25732cbd19dce4ee0030fb63d5a633964740bc04c9f5cf566f7974c4723
mod_nss-debuginfo-1.0.8-14.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1779
    MD5: dcd4d9c1860ead0df7da2d5fbe46a0c1
SHA-256: 4efae4f84f1cddae284dc830936edf0260934cc0393a07d99cb89756e80a4b17
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
mod_nss-1.0.8-14.el6_2.src.rpm
File outdated by:  RHSA-2013:1779
    MD5: 9cf05108228849a731d679a7aac3cff6
SHA-256: cceebaf6344bcea8db27706ca63ce83d224378fe55dd2ae9732d2780e03f2f21
 
IA-32:
mod_nss-1.0.8-14.el6_2.i686.rpm
File outdated by:  RHSA-2013:1779
    MD5: 96f9a3a59dc6369c108394daa6987113
SHA-256: b0b59567b9a60018c6dfdd07ff8f22011b0fe583bb24b6d2a84e5ea3823b2ea6
mod_nss-debuginfo-1.0.8-14.el6_2.i686.rpm
File outdated by:  RHSA-2013:1779
    MD5: 5aa79346ebf445e7882b79db101dcbf6
SHA-256: 41d7a18b7683bb971348ef929380dbc67f2ac0cc32158e0091c5a0d847927cfa
 
PPC:
mod_nss-1.0.8-14.el6_2.ppc64.rpm
File outdated by:  RHSA-2013:1779
    MD5: b165f5d95ef849402922bed4b034cf71
SHA-256: 2cfab942386c5e7d3d964bfdf07959350533991f9a3b0342369a23c549d66fd0
mod_nss-debuginfo-1.0.8-14.el6_2.ppc64.rpm
File outdated by:  RHSA-2013:1779
    MD5: e1f286743f1b26ca6b1909a09e307aac
SHA-256: 73b6465adf1a3023d75e3b0885d8241fad3dd45d98226585a2cb72d86e402249
 
s390x:
mod_nss-1.0.8-14.el6_2.s390x.rpm
File outdated by:  RHSA-2013:1779
    MD5: 6c3f9ce4c0e29161c2c38666c7b4f99c
SHA-256: d872c0a2acf1cdb1e3961d8bc73e0161337aec64dfaa590baee48bdf19681477
mod_nss-debuginfo-1.0.8-14.el6_2.s390x.rpm
File outdated by:  RHSA-2013:1779
    MD5: cd3caac2f26f0b6c2d5ec238d0937e43
SHA-256: 9f9c843afedd34a43e01f1a1cc897f69dbf52b502b1e35fd369ebb17ce720565
 
x86_64:
mod_nss-1.0.8-14.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1779
    MD5: 9e402b11aa9b168a6d339659afd4620c
SHA-256: 125dc25732cbd19dce4ee0030fb63d5a633964740bc04c9f5cf566f7974c4723
mod_nss-debuginfo-1.0.8-14.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1779
    MD5: dcd4d9c1860ead0df7da2d5fbe46a0c1
SHA-256: 4efae4f84f1cddae284dc830936edf0260934cc0393a07d99cb89756e80a4b17
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
mod_nss-1.0.8-14.el6_2.src.rpm
File outdated by:  RHSA-2013:1779
    MD5: 9cf05108228849a731d679a7aac3cff6
SHA-256: cceebaf6344bcea8db27706ca63ce83d224378fe55dd2ae9732d2780e03f2f21
 
x86_64:
mod_nss-1.0.8-14.el6_2.x86_64.rpm     MD5: 9e402b11aa9b168a6d339659afd4620c
SHA-256: 125dc25732cbd19dce4ee0030fb63d5a633964740bc04c9f5cf566f7974c4723
mod_nss-debuginfo-1.0.8-14.el6_2.x86_64.rpm     MD5: dcd4d9c1860ead0df7da2d5fbe46a0c1
SHA-256: 4efae4f84f1cddae284dc830936edf0260934cc0393a07d99cb89756e80a4b17
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
mod_nss-1.0.8-14.el6_2.src.rpm
File outdated by:  RHSA-2013:1779
    MD5: 9cf05108228849a731d679a7aac3cff6
SHA-256: cceebaf6344bcea8db27706ca63ce83d224378fe55dd2ae9732d2780e03f2f21
 
IA-32:
mod_nss-1.0.8-14.el6_2.i686.rpm     MD5: 96f9a3a59dc6369c108394daa6987113
SHA-256: b0b59567b9a60018c6dfdd07ff8f22011b0fe583bb24b6d2a84e5ea3823b2ea6
mod_nss-debuginfo-1.0.8-14.el6_2.i686.rpm     MD5: 5aa79346ebf445e7882b79db101dcbf6
SHA-256: 41d7a18b7683bb971348ef929380dbc67f2ac0cc32158e0091c5a0d847927cfa
 
PPC:
mod_nss-1.0.8-14.el6_2.ppc64.rpm     MD5: b165f5d95ef849402922bed4b034cf71
SHA-256: 2cfab942386c5e7d3d964bfdf07959350533991f9a3b0342369a23c549d66fd0
mod_nss-debuginfo-1.0.8-14.el6_2.ppc64.rpm     MD5: e1f286743f1b26ca6b1909a09e307aac
SHA-256: 73b6465adf1a3023d75e3b0885d8241fad3dd45d98226585a2cb72d86e402249
 
s390x:
mod_nss-1.0.8-14.el6_2.s390x.rpm     MD5: 6c3f9ce4c0e29161c2c38666c7b4f99c
SHA-256: d872c0a2acf1cdb1e3961d8bc73e0161337aec64dfaa590baee48bdf19681477
mod_nss-debuginfo-1.0.8-14.el6_2.s390x.rpm     MD5: cd3caac2f26f0b6c2d5ec238d0937e43
SHA-256: 9f9c843afedd34a43e01f1a1cc897f69dbf52b502b1e35fd369ebb17ce720565
 
x86_64:
mod_nss-1.0.8-14.el6_2.x86_64.rpm     MD5: 9e402b11aa9b168a6d339659afd4620c
SHA-256: 125dc25732cbd19dce4ee0030fb63d5a633964740bc04c9f5cf566f7974c4723
mod_nss-debuginfo-1.0.8-14.el6_2.x86_64.rpm     MD5: dcd4d9c1860ead0df7da2d5fbe46a0c1
SHA-256: 4efae4f84f1cddae284dc830936edf0260934cc0393a07d99cb89756e80a4b17
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
mod_nss-1.0.8-14.el6_2.src.rpm
File outdated by:  RHSA-2013:1779
    MD5: 9cf05108228849a731d679a7aac3cff6
SHA-256: cceebaf6344bcea8db27706ca63ce83d224378fe55dd2ae9732d2780e03f2f21
 
IA-32:
mod_nss-1.0.8-14.el6_2.i686.rpm
File outdated by:  RHSA-2013:1779
    MD5: 96f9a3a59dc6369c108394daa6987113
SHA-256: b0b59567b9a60018c6dfdd07ff8f22011b0fe583bb24b6d2a84e5ea3823b2ea6
mod_nss-debuginfo-1.0.8-14.el6_2.i686.rpm
File outdated by:  RHSA-2013:1779
    MD5: 5aa79346ebf445e7882b79db101dcbf6
SHA-256: 41d7a18b7683bb971348ef929380dbc67f2ac0cc32158e0091c5a0d847927cfa
 
x86_64:
mod_nss-1.0.8-14.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1779
    MD5: 9e402b11aa9b168a6d339659afd4620c
SHA-256: 125dc25732cbd19dce4ee0030fb63d5a633964740bc04c9f5cf566f7974c4723
mod_nss-debuginfo-1.0.8-14.el6_2.x86_64.rpm
File outdated by:  RHSA-2013:1779
    MD5: dcd4d9c1860ead0df7da2d5fbe46a0c1
SHA-256: 4efae4f84f1cddae284dc830936edf0260934cc0393a07d99cb89756e80a4b17
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/