First published: Mon Aug 05 2013(Updated: )
Network Security Services (NSS) is a set of libraries designed to support<br>the cross-platform development of security-enabled client and server<br>applications. Netscape Portable Runtime (NSPR) provides platform<br>independence for non-GUI operating system facilities.<br>It was discovered that NSS leaked timing information when decrypting<br>TLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites<br>were used. A remote attacker could possibly use this flaw to retrieve plain<br>text from the encrypted packets by using a TLS/SSL or DTLS server as a<br>padding oracle. (CVE-2013-1620)<br>An out-of-bounds memory read flaw was found in the way NSS decoded certain<br>certificates. If an application using NSS decoded a malformed certificate,<br>it could cause the application to crash. (CVE-2013-0791)<br>Red Hat would like to thank the Mozilla project for reporting<br>CVE-2013-0791. Upstream acknowledges Ambroz Bizjak as the original reporter<br>of CVE-2013-0791.<br>This update also fixes the following bugs:<br><li> A defect in the FreeBL library implementation of the Diffie-Hellman (DH)</li> protocol previously caused Openswan to drop connections. (BZ#958023)<br><li> A memory leak in the nssutil_ReadSecmodDB() function has been fixed.</li> (BZ#986969)<br>In addition, the nss package has been upgraded to upstream version 3.14.3,<br>and the nspr package has been upgraded to upstream version 4.9.5. These<br>updates provide a number of bug fixes and enhancements over the previous<br>versions. (BZ#949845, BZ#924741)<br>Note that while upstream NSS version 3.14 prevents the use of certificates<br>that have an MD5 signature, this erratum includes a patch that allows such<br>certificates by default. To prevent the use of certificates that have an<br>MD5 signature, set the "NSS_HASH_ALG_SUPPORT" environment variable<br>to "-MD5".<br>Users of NSS and NSPR are advised to upgrade to these updated packages,<br>which fix these issues and add these enhancements. After installing this<br>update, applications using NSS or NSPR must be restarted for this update to<br>take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nspr | <4.9.5-1.el5_9 | 4.9.5-1.el5_9 |
redhat/nss | <3.14.3-6.el5_9 | 3.14.3-6.el5_9 |
redhat/nspr | <4.9.5-1.el5_9 | 4.9.5-1.el5_9 |
redhat/nspr-debuginfo | <4.9.5-1.el5_9 | 4.9.5-1.el5_9 |
redhat/nspr-debuginfo | <4.9.5-1.el5_9 | 4.9.5-1.el5_9 |
redhat/nspr-devel | <4.9.5-1.el5_9 | 4.9.5-1.el5_9 |
redhat/nspr-devel | <4.9.5-1.el5_9 | 4.9.5-1.el5_9 |
redhat/nss | <3.14.3-6.el5_9 | 3.14.3-6.el5_9 |
redhat/nss-debuginfo | <3.14.3-6.el5_9 | 3.14.3-6.el5_9 |
redhat/nss-debuginfo | <3.14.3-6.el5_9 | 3.14.3-6.el5_9 |
redhat/nss-devel | <3.14.3-6.el5_9 | 3.14.3-6.el5_9 |
redhat/nss-devel | <3.14.3-6.el5_9 | 3.14.3-6.el5_9 |
redhat/nss-pkcs11-devel | <3.14.3-6.el5_9 | 3.14.3-6.el5_9 |
redhat/nss-pkcs11-devel | <3.14.3-6.el5_9 | 3.14.3-6.el5_9 |
redhat/nss-tools | <3.14.3-6.el5_9 | 3.14.3-6.el5_9 |
redhat/nss-tools | <3.14.3-6.el5_9 | 3.14.3-6.el5_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.