Security Advisory Critical: nss security update

Advisory: RHSA-2017:1103-1
Type: Security Advisory
Severity: Critical
Issued on: 2017-04-20
Last updated on: 2017-04-20
Affected Products: Red Hat Enterprise Linux Long Life (v. 5.9 server)
CVEs (cve.mitre.org): CVE-2017-5461

Details

An update for nss is now available for Red Hat Enterprise Linux 5.9 Long Life.

Red Hat Product Security has rated this update as having a security impact of
Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

Network Security Services (NSS) is a set of libraries designed to support the
cross-platform development of security-enabled client and server applications.

Security Fix(es):

* An out-of-bounds write flaw was found in the way NSS performed certain
Base64-decoding operations. An attacker could use this flaw to create a
specially crafted certificate which, when parsed by NSS, could cause it to crash
or execute arbitrary code, using the permissions of the user running an
application compiled against the NSS library. (CVE-2017-5461)

Red Hat would like to thank the Mozilla project for reporting this issue.
Upstream acknowledges Ronald Crane as the original reporter.


Solution

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, applications using NSS (for example, Firefox) must
be restarted for this update to take effect.

Updated packages

Red Hat Enterprise Linux Long Life (v. 5.9 server)

SRPMS:
nss-3.14.3-11.el5_9.src.rpm     MD5: 7c09c55a9bacc6f6adfd647729e409dc
SHA-256: 1c852de60bdd4166b788a36931c517aba03d058c7bac4c851ce8d3caa3aef110
 
IA-32:
nss-3.14.3-11.el5_9.i386.rpm     MD5: 412cb3b88c1aa49b3559b8e82e5c92f8
SHA-256: bcf8caecf6c3ee0969c83df38bdace85f8b10b5a2f30ccc05a41871527872659
nss-debuginfo-3.14.3-11.el5_9.i386.rpm     MD5: 40527843226eed48d3f88a78223c36da
SHA-256: 2e7716a5cfac1fa553d7c092f7fb53575beb278a07ee1b1a00d9e8a5ca9f7d58
nss-devel-3.14.3-11.el5_9.i386.rpm     MD5: c4359979b6b566f1c0b3874e923fc59d
SHA-256: 94f6efb2edd3c6fea3c11f6bf6866b3c5c390fce3ae941f3a80150df22a60df6
nss-pkcs11-devel-3.14.3-11.el5_9.i386.rpm     MD5: 4a6c2f02f8e644b3f20e3450a05df074
SHA-256: f8fadeb27b769417c64f5b39b009c35699bb174e99ef7173f757c3038f61318c
nss-tools-3.14.3-11.el5_9.i386.rpm     MD5: 8b58c4d28bf8a12a9948c9ac0e65bf32
SHA-256: 200d0b35a7f442e327effef2daec344a0bada452a0c6d1ea516146ca8b241d99
 
IA-64:
nss-3.14.3-11.el5_9.i386.rpm     MD5: 412cb3b88c1aa49b3559b8e82e5c92f8
SHA-256: bcf8caecf6c3ee0969c83df38bdace85f8b10b5a2f30ccc05a41871527872659
nss-3.14.3-11.el5_9.ia64.rpm     MD5: 72972bd7303c7329729b26b1766e4434
SHA-256: d37b7785c60f8fc553d00b9c1a590ab18a18e8c5ecc19bde88cbaf4409c66bd6
nss-debuginfo-3.14.3-11.el5_9.i386.rpm     MD5: 40527843226eed48d3f88a78223c36da
SHA-256: 2e7716a5cfac1fa553d7c092f7fb53575beb278a07ee1b1a00d9e8a5ca9f7d58
nss-debuginfo-3.14.3-11.el5_9.ia64.rpm     MD5: 032cb4137e194ebd5782937d1f3ab6ea
SHA-256: 7b6326c8657139f38beb6aefa7b7e70b6a26d31ca55e9ed9eff204a6f60459c5
nss-devel-3.14.3-11.el5_9.ia64.rpm     MD5: 2cabf8af3ddc783d3627a3d424d0ea8d
SHA-256: 3997b00ec5f09c7ce7d42dfaa51208c1c0a3b41cae1611a984f331bda3b3d244
nss-pkcs11-devel-3.14.3-11.el5_9.ia64.rpm     MD5: da735ec0b6c0227e3a89071a062482b9
SHA-256: b3f2eda95a48c29737721b94c1c526ce144fdde3079c01588fc5127555777528
nss-tools-3.14.3-11.el5_9.ia64.rpm     MD5: 7023dc508b0f730a3ccf925eb656df36
SHA-256: 791ba2ad05891002db5cf73f1e3e7223aa4111185ba80dc716ffe80ccc105435
 
x86_64:
nss-3.14.3-11.el5_9.i386.rpm     MD5: 412cb3b88c1aa49b3559b8e82e5c92f8
SHA-256: bcf8caecf6c3ee0969c83df38bdace85f8b10b5a2f30ccc05a41871527872659
nss-3.14.3-11.el5_9.x86_64.rpm     MD5: 53b22b72c54ca3adb896d3443f2d19ed
SHA-256: ef601c3cf0d217714e96962608ee11a1113f9717da4e303a13d85dabb446778c
nss-debuginfo-3.14.3-11.el5_9.i386.rpm     MD5: 40527843226eed48d3f88a78223c36da
SHA-256: 2e7716a5cfac1fa553d7c092f7fb53575beb278a07ee1b1a00d9e8a5ca9f7d58
nss-debuginfo-3.14.3-11.el5_9.x86_64.rpm     MD5: 3e890176b707d6db2eb6c16e4cd4eab8
SHA-256: 4da3fa3ac0132f92a939066464d70446cd89a817fb309726ee50dc2072b6e568
nss-devel-3.14.3-11.el5_9.i386.rpm     MD5: c4359979b6b566f1c0b3874e923fc59d
SHA-256: 94f6efb2edd3c6fea3c11f6bf6866b3c5c390fce3ae941f3a80150df22a60df6
nss-devel-3.14.3-11.el5_9.x86_64.rpm     MD5: 282b49ebfb089d279b8a8a0702420a1c
SHA-256: d643b4ae422f4ea6ce0a1eea4e5592d487d81a3bbadb823866ae46141b00a3e1
nss-pkcs11-devel-3.14.3-11.el5_9.i386.rpm     MD5: 4a6c2f02f8e644b3f20e3450a05df074
SHA-256: f8fadeb27b769417c64f5b39b009c35699bb174e99ef7173f757c3038f61318c
nss-pkcs11-devel-3.14.3-11.el5_9.x86_64.rpm     MD5: f2adf0f0efe3ad421bf0615aaada4542
SHA-256: 2af3f2be99ae73f308ca27bd5255b2652a0c219092df3b414a21d5531b0558fa
nss-tools-3.14.3-11.el5_9.x86_64.rpm     MD5: af3a102bc50e15610c2853249b421cb6
SHA-256: d10e91e422e046552e5c9ff1ff44da07ff8369a3238036474bc83d78e1d978a5
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1440080 - CVE-2017-5461 nss: Write beyond bounds caused by bugs in Base64 de/encoding in nssb64d.c and nssb64e.c (MFSA 2017-10)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/