nss (SL6, SL7)

Synopsis: Moderate: nss security update
Advisory ID: SLSA-2016:0007-1
Issue Date: 2016-01-07
CVE Numbers: CVE-2015-7575

A flaw was found in the way TLS 1.2 could use the MD5 hash function for
signing ServerKeyExchange and Client Authentication packets during a TLS
handshake. A man-in-the-middle attacker able to force a TLS connection to
use the MD5 hash function could use this flaw to conduct collision attacks
to impersonate a TLS server or an authenticated TLS client.
(CVE-2015-7575)

For the update to take effect, all services linked to the NSS library must
be restarted, or the system rebooted.

SL6
x86_64
nss-3.19.1-8.el6_7.i686.rpm
nss-3.19.1-8.el6_7.x86_64.rpm
nss-debuginfo-3.19.1-8.el6_7.i686.rpm
nss-debuginfo-3.19.1-8.el6_7.x86_64.rpm
nss-sysinit-3.19.1-8.el6_7.x86_64.rpm
nss-tools-3.19.1-8.el6_7.x86_64.rpm
nss-devel-3.19.1-8.el6_7.i686.rpm
nss-devel-3.19.1-8.el6_7.x86_64.rpm
nss-pkcs11-devel-3.19.1-8.el6_7.i686.rpm
nss-pkcs11-devel-3.19.1-8.el6_7.x86_64.rpm
i386
nss-3.19.1-8.el6_7.i686.rpm
nss-debuginfo-3.19.1-8.el6_7.i686.rpm
nss-sysinit-3.19.1-8.el6_7.i686.rpm
nss-tools-3.19.1-8.el6_7.i686.rpm
nss-devel-3.19.1-8.el6_7.i686.rpm
nss-pkcs11-devel-3.19.1-8.el6_7.i686.rpm
SL7
x86_64
nss-3.19.1-19.el7_2.i686.rpm
nss-3.19.1-19.el7_2.x86_64.rpm
nss-debuginfo-3.19.1-19.el7_2.i686.rpm
nss-debuginfo-3.19.1-19.el7_2.x86_64.rpm
nss-sysinit-3.19.1-19.el7_2.x86_64.rpm
nss-tools-3.19.1-19.el7_2.x86_64.rpm
nss-devel-3.19.1-19.el7_2.i686.rpm
nss-devel-3.19.1-19.el7_2.x86_64.rpm
nss-pkcs11-devel-3.19.1-19.el7_2.i686.rpm
nss-pkcs11-devel-3.19.1-19.el7_2.x86_64.rpm

– Scientific Linux Development Team