Skip to navigation

Bug Fix Advisory mod_nss bug fix update

Advisory: RHBA-2012:1260-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-09-12
Last updated on: 2012-09-12
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated mod_nss packages that fix a bug are now available for Red Hat Enterprise
Linux 5.

The mod_nss module provides strong cryptography for the Apache HTTP Server via
the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols,
using the Network Security Services (NSS) security library.

This update fixes the following bug:

* Due to a regression, the mod_proxy module no longer worked when configured to
support SSL reverse proxy operation. The following error message was logged:

[error] SSL Proxy: I don't have the name of the host we're supposed to
connect to so I can't verify that we are connecting to who we think we should
be. Giving up.

A new patch has been applied and the mod_proxy module now works correctly to
support SSL reverse proxy. (BZ#849044)

All users of mod_nss are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
mod_nss-1.0.8-4.el5_8.2.src.rpm
File outdated by:  RHSA-2013:1779
    MD5: 4be7f7b9bb9af61ebaf0dee8c0dad88f
SHA-256: d19de276198c3fd978fc8d6e9b63b2b5b9cfce4fbeff413fcf5d31d9e1af695a
 
IA-32:
mod_nss-1.0.8-4.el5_8.2.i386.rpm
File outdated by:  RHSA-2013:1779
    MD5: b51c14baf0d62b049df423ef89bdea9a
SHA-256: 68fbfca7c0eab084d6b6867691c53cb3f03dd76827456a5654102f83c02334fd
mod_nss-debuginfo-1.0.8-4.el5_8.2.i386.rpm
File outdated by:  RHSA-2013:1779
    MD5: 20661b2cb75f23a6d9295dbc2fdbd175
SHA-256: 64cf90acf962794f74f77f853768f905e9c2d4e3f86358e577f0b76496f75bd5
 
IA-64:
mod_nss-1.0.8-4.el5_8.2.ia64.rpm
File outdated by:  RHSA-2013:1779
    MD5: 40cc1e3e188d17e8af7ab621f491a131
SHA-256: c73ab9b5b276a326cfadb1d78df0d68e355a6152e1ef6ecd20b337359274b5fb
mod_nss-debuginfo-1.0.8-4.el5_8.2.ia64.rpm
File outdated by:  RHSA-2013:1779
    MD5: 5cf652e59bd6a9eb449fb70df8f761ba
SHA-256: cc971c95a899f1782057c2119921b087fc8e3d64e5492ffe6c98ff616bc83b4c
 
PPC:
mod_nss-1.0.8-4.el5_8.2.ppc.rpm
File outdated by:  RHSA-2013:1779
    MD5: c13f4ebfb1c73c5874b83662197fd91a
SHA-256: e692e0e52152ec4ebf0b681fcd2b5f76ec4d020b45be484b544d3176d3cf5a7d
mod_nss-debuginfo-1.0.8-4.el5_8.2.ppc.rpm
File outdated by:  RHSA-2013:1779
    MD5: 8e3de464048421f3b9f7184e76806bf2
SHA-256: f8666adb37767f4b22a19755ef60161024d909f768f7b32b8dd4a847d930a8f2
 
s390x:
mod_nss-1.0.8-4.el5_8.2.s390x.rpm
File outdated by:  RHSA-2013:1779
    MD5: 8ff8e703183e8e39b56f43461294642d
SHA-256: 313faa53626ea3aae3862045b5eaf790ce6955ac941808372fe640e9f68b0078
mod_nss-debuginfo-1.0.8-4.el5_8.2.s390x.rpm
File outdated by:  RHSA-2013:1779
    MD5: aea201541f15669cbdf3b9b60ff8f235
SHA-256: 615eafac666850cd60a38316eb61ad217244bc88f88df3a897df203c62d414be
 
x86_64:
mod_nss-1.0.8-4.el5_8.2.x86_64.rpm
File outdated by:  RHSA-2013:1779
    MD5: ec63e0c647845808adac4632bbea036d
SHA-256: 5ffa9f0411965c4973209fbefba90508a3f8b45525c94df534724f7096c82446
mod_nss-debuginfo-1.0.8-4.el5_8.2.x86_64.rpm
File outdated by:  RHSA-2013:1779
    MD5: d3464d36d052b65b80fa019fa4854459
SHA-256: c568e94dc405d172c7ffaabfa63310d1608265ff0815a163e7fe1946109be88b
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
mod_nss-1.0.8-4.el5_8.2.src.rpm
File outdated by:  RHSA-2013:1779
    MD5: 4be7f7b9bb9af61ebaf0dee8c0dad88f
SHA-256: d19de276198c3fd978fc8d6e9b63b2b5b9cfce4fbeff413fcf5d31d9e1af695a
 
IA-32:
mod_nss-1.0.8-4.el5_8.2.i386.rpm
File outdated by:  RHSA-2013:1779
    MD5: b51c14baf0d62b049df423ef89bdea9a
SHA-256: 68fbfca7c0eab084d6b6867691c53cb3f03dd76827456a5654102f83c02334fd
mod_nss-debuginfo-1.0.8-4.el5_8.2.i386.rpm
File outdated by:  RHSA-2013:1779
    MD5: 20661b2cb75f23a6d9295dbc2fdbd175
SHA-256: 64cf90acf962794f74f77f853768f905e9c2d4e3f86358e577f0b76496f75bd5
 
x86_64:
mod_nss-1.0.8-4.el5_8.2.x86_64.rpm
File outdated by:  RHSA-2013:1779
    MD5: ec63e0c647845808adac4632bbea036d
SHA-256: 5ffa9f0411965c4973209fbefba90508a3f8b45525c94df534724f7096c82446
mod_nss-debuginfo-1.0.8-4.el5_8.2.x86_64.rpm
File outdated by:  RHSA-2013:1779
    MD5: d3464d36d052b65b80fa019fa4854459
SHA-256: c568e94dc405d172c7ffaabfa63310d1608265ff0815a163e7fe1946109be88b
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/