Important CentOS nss Security Update

Metadata

high
unknown
nss-3.16.2.3-1.el5_11.i386.rpm, nss-3.16.2.3-1.el5_11.src.rpm, nss-3.16.2.3-1.el5_11.x86_64.rpm, nss-3.16.2.3-2.el7_0.i686.rpm, nss-3.16.2.3-2.el7_0.src.rpm, nss-3.16.2.3-2.el7_0.x86_64.rpm, nss-3.16.2.3-3.el6_6.i686.rpm, nss-3.16.2.3-3.el6_6.src.rpm, nss-3.16.2.3-3.el6_6.x86_64.rpm, nss-devel-3.16.2.3-1.el5_11.i386.rpm, nss-devel-3.16.2.3-1.el5_11.x86_64.rpm, nss-devel-3.16.2.3-2.el7_0.i686.rpm, nss-devel-3.16.2.3-2.el7_0.x86_64.rpm, nss-devel-3.16.2.3-3.el6_6.i686.rpm, nss-devel-3.16.2.3-3.el6_6.x86_64.rpm, nss-pkcs11-devel-3.16.2.3-1.el5_11.i386.rpm, nss-pkcs11-devel-3.16.2.3-1.el5_11.x86_64.rpm, nss-pkcs11-devel-3.16.2.3-2.el7_0.i686.rpm, nss-pkcs11-devel-3.16.2.3-2.el7_0.x86_64.rpm, nss-pkcs11-devel-3.16.2.3-3.el6_6.i686.rpm, nss-pkcs11-devel-3.16.2.3-3.el6_6.x86_64.rpm, nss-softokn-3.16.2.3-1.el7_0.i686.rpm, nss-softokn-3.16.2.3-1.el7_0.src.rpm, nss-softokn-3.16.2.3-1.el7_0.x86_64.rpm, nss-softokn-devel-3.16.2.3-1.el7_0.i686.rpm, nss-softokn-devel-3.16.2.3-1.el7_0.x86_64.rpm, nss-softokn-freebl-3.16.2.3-1.el7_0.i686.rpm, nss-softokn-freebl-3.16.2.3-1.el7_0.x86_64.rpm, nss-softokn-freebl-devel-3.16.2.3-1.el7_0.i686.rpm, nss-softokn-freebl-devel-3.16.2.3-1.el7_0.x86_64.rpm, nss-sysinit-3.16.2.3-2.el7_0.x86_64.rpm, nss-sysinit-3.16.2.3-3.el6_6.i686.rpm, nss-sysinit-3.16.2.3-3.el6_6.x86_64.rpm, nss-tools-3.16.2.3-1.el5_11.i386.rpm, nss-tools-3.16.2.3-1.el5_11.x86_64.rpm, nss-tools-3.16.2.3-2.el7_0.x86_64.rpm, nss-tools-3.16.2.3-3.el6_6.i686.rpm, nss-tools-3.16.2.3-3.el6_6.x86_64.rpm, nss-util-3.16.2.3-1.el7_0.i686.rpm, nss-util-3.16.2.3-1.el7_0.src.rpm, nss-util-3.16.2.3-1.el7_0.x86_64.rpm, nss-util-3.16.2.3-2.el6_6.i686.rpm, nss-util-3.16.2.3-2.el6_6.src.rpm, nss-util-3.16.2.3-2.el6_6.x86_64.rpm, nss-util-devel-3.16.2.3-1.el7_0.i686.rpm, nss-util-devel-3.16.2.3-1.el7_0.x86_64.rpm, nss-util-devel-3.16.2.3-2.el6_6.i686.rpm, nss-util-devel-3.16.2.3-2.el6_6.x86_64.rpm
rhn.redhat.com, lists.centos.org, lists.centos.org, lists.centos.org
2014-12-03
2017-07-27 19:08
2017-04-01 19:08
2017-01-05 20:12

Description


Updated nss, nss-util, and nss-softokn packages that contain a patch to
mitigate the CVE-2014-3566 issue, fix a number of bugs, and add various
enhancements are now available for Red Hat Enterprise Linux 5, 6, and 7.

Red Hat Product Security has rated this update as having Important
security impact.

Network Security Services (NSS) is a set of libraries designed to support
the cross-platform development of security-enabled client and server
applications. Netscape Portable Runtime (NSPR) provides platform
independence for non-GUI operating system facilities.

This update adds support for the TLS Fallback Signaling Cipher Suite Value
(TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade
attacks against applications which re-connect using a lower SSL/TLS
protocol version when the initial connection indicating the highest
supported protocol version fails.

This can prevent a forceful downgrade of the communication to SSL 3.0.
The SSL 3.0 protocol was found to be vulnerable to the padding oracle
attack when using block cipher suites in cipher block chaining (CBC) mode.
This issue is identified as CVE-2014-3566, and also known under the alias
POODLE. This SSL 3.0 protocol flaw will not be addressed in a future
update; it is recommended that users configure their applications to
require at least TLS protocol version 1.0 for secure communication.

For additional information about this flaw, see the Knowledgebase article
at https://access.redhat.com/articles/1232123

The nss, nss-util, and nss-softokn packages have been upgraded to upstream
version 3.16.2.3, which provides a number of bug fixes and enhancements
over the previous version, and adds the support for Mozilla Firefox 31.3.
(BZ#1158159, BZ#1165003, BZ#1165525)

Users of nss, nss-util, and nss-softokn are advised to upgrade to these
updated packages, which contain a backported patch to mitigate the
CVE-2014-3566 issue, fix these bugs, and add these enhancements. After
installing this update, applications using NSS or NSPR must be restarted
for this update to take effect.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
5 nss nss-3.16.2.3-1.el5_11.i386.rpm
nss nss-3.16.2.3-1.el5_11.src.rpm
nss nss-3.16.2.3-1.el5_11.x86_64.rpm
nss-devel nss-devel-3.16.2.3-1.el5_11.i386.rpm
nss-devel nss-devel-3.16.2.3-1.el5_11.x86_64.rpm
nss-pkcs11-devel nss-pkcs11-devel-3.16.2.3-1.el5_11.i386.rpm
nss-pkcs11-devel nss-pkcs11-devel-3.16.2.3-1.el5_11.x86_64.rpm
nss-tools nss-tools-3.16.2.3-1.el5_11.i386.rpm
nss-tools nss-tools-3.16.2.3-1.el5_11.x86_64.rpm
6 nss nss-3.16.2.3-3.el6_6.src.rpm
nss nss-3.16.2.3-3.el6_6.x86_64.rpm
nss nss-3.16.2.3-3.el6_6.i686.rpm
nss-devel nss-devel-3.16.2.3-3.el6_6.x86_64.rpm
nss-devel nss-devel-3.16.2.3-3.el6_6.i686.rpm
nss-pkcs11-devel nss-pkcs11-devel-3.16.2.3-3.el6_6.x86_64.rpm
nss-pkcs11-devel nss-pkcs11-devel-3.16.2.3-3.el6_6.i686.rpm
nss-sysinit nss-sysinit-3.16.2.3-3.el6_6.i686.rpm
nss-sysinit nss-sysinit-3.16.2.3-3.el6_6.x86_64.rpm
nss-tools nss-tools-3.16.2.3-3.el6_6.i686.rpm
nss-tools nss-tools-3.16.2.3-3.el6_6.x86_64.rpm
nss-util nss-util-3.16.2.3-2.el6_6.i686.rpm
nss-util nss-util-3.16.2.3-2.el6_6.x86_64.rpm
nss-util nss-util-3.16.2.3-2.el6_6.src.rpm
nss-util-devel nss-util-devel-3.16.2.3-2.el6_6.x86_64.rpm
nss-util-devel nss-util-devel-3.16.2.3-2.el6_6.i686.rpm
7 nss nss-3.16.2.3-2.el7_0.x86_64.rpm
nss nss-3.16.2.3-2.el7_0.i686.rpm
nss nss-3.16.2.3-2.el7_0.src.rpm
nss-devel nss-devel-3.16.2.3-2.el7_0.i686.rpm
nss-devel nss-devel-3.16.2.3-2.el7_0.x86_64.rpm
nss-pkcs11-devel nss-pkcs11-devel-3.16.2.3-2.el7_0.x86_64.rpm
nss-pkcs11-devel nss-pkcs11-devel-3.16.2.3-2.el7_0.i686.rpm
nss-softokn nss-softokn-3.16.2.3-1.el7_0.src.rpm
nss-softokn nss-softokn-3.16.2.3-1.el7_0.i686.rpm
nss-softokn nss-softokn-3.16.2.3-1.el7_0.x86_64.rpm
nss-softokn-devel nss-softokn-devel-3.16.2.3-1.el7_0.i686.rpm
nss-softokn-devel nss-softokn-devel-3.16.2.3-1.el7_0.x86_64.rpm
nss-softokn-freebl nss-softokn-freebl-3.16.2.3-1.el7_0.x86_64.rpm
nss-softokn-freebl nss-softokn-freebl-3.16.2.3-1.el7_0.i686.rpm
nss-softokn-freebl-devel nss-softokn-freebl-devel-3.16.2.3-1.el7_0.x86_64.rpm
nss-softokn-freebl-devel nss-softokn-freebl-devel-3.16.2.3-1.el7_0.i686.rpm
nss-sysinit nss-sysinit-3.16.2.3-2.el7_0.x86_64.rpm
nss-tools nss-tools-3.16.2.3-2.el7_0.x86_64.rpm
nss-util nss-util-3.16.2.3-1.el7_0.x86_64.rpm
nss-util nss-util-3.16.2.3-1.el7_0.src.rpm
nss-util nss-util-3.16.2.3-1.el7_0.i686.rpm
nss-util-devel nss-util-devel-3.16.2.3-1.el7_0.i686.rpm
nss-util-devel nss-util-devel-3.16.2.3-1.el7_0.x86_64.rpm