Synopsis: Moderate: nss security update
Advisory ID: SLSA-2013:1861-1
Issue Date: 2013-12-19
CVE Numbers: None Acquired
—
It was found that a subordinate Certificate Authority (CA) mis-issued an
intermediate certificate, which could be used to conduct man-in-the-middle
attacks. This update renders that particular intermediate certificate as
untrusted.
Note: This fix only applies to applications using the NSS Builtin Object
Token. It does not render the certificates untrusted for applications that
use the NSS library, but do not use the NSS Builtin Object Token.
After installing the update, applications using NSS must be restarted for
the changes to take effect.
—
SL5
x86_64
nss-3.15.3-4.el5_10.i386.rpm
nss-3.15.3-4.el5_10.x86_64.rpm
nss-debuginfo-3.15.3-4.el5_10.i386.rpm
nss-debuginfo-3.15.3-4.el5_10.x86_64.rpm
nss-tools-3.15.3-4.el5_10.x86_64.rpm
nss-devel-3.15.3-4.el5_10.i386.rpm
nss-devel-3.15.3-4.el5_10.x86_64.rpm
nss-pkcs11-devel-3.15.3-4.el5_10.i386.rpm
nss-pkcs11-devel-3.15.3-4.el5_10.x86_64.rpm
i386
nss-3.15.3-4.el5_10.i386.rpm
nss-debuginfo-3.15.3-4.el5_10.i386.rpm
nss-tools-3.15.3-4.el5_10.i386.rpm
nss-devel-3.15.3-4.el5_10.i386.rpm
nss-pkcs11-devel-3.15.3-4.el5_10.i386.rpm
SL6
x86_64
nss-3.15.3-3.el6_5.i686.rpm
nss-3.15.3-3.el6_5.x86_64.rpm
nss-debuginfo-3.15.3-3.el6_5.i686.rpm
nss-debuginfo-3.15.3-3.el6_5.x86_64.rpm
nss-sysinit-3.15.3-3.el6_5.x86_64.rpm
nss-tools-3.15.3-3.el6_5.x86_64.rpm
nss-devel-3.15.3-3.el6_5.i686.rpm
nss-devel-3.15.3-3.el6_5.x86_64.rpm
nss-pkcs11-devel-3.15.3-3.el6_5.i686.rpm
nss-pkcs11-devel-3.15.3-3.el6_5.x86_64.rpm
i386
nss-3.15.3-3.el6_5.i686.rpm
nss-debuginfo-3.15.3-3.el6_5.i686.rpm
nss-sysinit-3.15.3-3.el6_5.i686.rpm
nss-tools-3.15.3-3.el6_5.i686.rpm
nss-devel-3.15.3-3.el6_5.i686.rpm
nss-pkcs11-devel-3.15.3-3.el6_5.i686.rpm
– Scientific Linux Development Team