nss (SL5)

Synopsis: Moderate: nss security, bug fix, and enhancement update
Advisory ID: SLSA-2015:1664-1
Issue Date: 2015-08-24
CVE Numbers: CVE-2015-2730
CVE-2015-2721

It was found that NSS permitted skipping of the ServerKeyExchange packet
during a handshake involving ECDHE (Elliptic Curve Diffie-Hellman key
Exchange). A remote attacker could use this flaw to bypass the forward-
secrecy of a TLS/SSL connection. (CVE-2015-2721)

A flaw was found in the way NSS verified certain ECDSA (Elliptic Curve
Digital Signature Algorithm) signatures. Under certain conditions, an
attacker could use this flaw to conduct signature forgery attacks.
(CVE-2015-2730)

The nss packages have been upgraded to upstream version 3.19.1, which
provides a number of bug fixes and enhancements over the previous version.

SL5
x86_64
nss-3.19.1-1.el5_11.i386.rpm
nss-3.19.1-1.el5_11.x86_64.rpm
nss-debuginfo-3.19.1-1.el5_11.i386.rpm
nss-debuginfo-3.19.1-1.el5_11.x86_64.rpm
nss-tools-3.19.1-1.el5_11.x86_64.rpm
nss-devel-3.19.1-1.el5_11.i386.rpm
nss-devel-3.19.1-1.el5_11.x86_64.rpm
nss-pkcs11-devel-3.19.1-1.el5_11.i386.rpm
nss-pkcs11-devel-3.19.1-1.el5_11.x86_64.rpm
i386
nss-3.19.1-1.el5_11.i386.rpm
nss-debuginfo-3.19.1-1.el5_11.i386.rpm
nss-tools-3.19.1-1.el5_11.i386.rpm
nss-devel-3.19.1-1.el5_11.i386.rpm
nss-pkcs11-devel-3.19.1-1.el5_11.i386.rpm

– Scientific Linux Development Team