Synopsis: Critical: nss security update
Advisory ID: SLSA-2016:0371-1
Issue Date: 2016-03-09
CVE Numbers: CVE-2016-1950
—
A heap-based buffer overflow flaw was found in the way NSS parsed certain
ASN.1 structures. An attacker could use this flaw to create a specially
crafted certificate which, when parsed by NSS, could cause it to crash, or
execute arbitrary code, using the permissions of the user running an
application compiled against the NSS library. (CVE-2016-1950)
For the update to take effect, all applications linked to the nss library
must be restarted, or the system rebooted.
—
SL5
x86_64
nss-3.19.1-4.el5_11.i386.rpm
nss-3.19.1-4.el5_11.x86_64.rpm
nss-debuginfo-3.19.1-4.el5_11.i386.rpm
nss-debuginfo-3.19.1-4.el5_11.x86_64.rpm
nss-tools-3.19.1-4.el5_11.x86_64.rpm
nss-devel-3.19.1-4.el5_11.i386.rpm
nss-devel-3.19.1-4.el5_11.x86_64.rpm
nss-pkcs11-devel-3.19.1-4.el5_11.i386.rpm
nss-pkcs11-devel-3.19.1-4.el5_11.x86_64.rpm
i386
nss-3.19.1-4.el5_11.i386.rpm
nss-debuginfo-3.19.1-4.el5_11.i386.rpm
nss-tools-3.19.1-4.el5_11.i386.rpm
nss-devel-3.19.1-4.el5_11.i386.rpm
nss-pkcs11-devel-3.19.1-4.el5_11.i386.rpm
– Scientific Linux Development Team