Date: Mon, 24 Aug 2015 19:51:13 +0000 Reply-To: scientific-linux-users@listserv.fnal.gov Sender: Security Errata for Scientific LinuxFrom: Pat Riehecky Subject: Security ERRATA Moderate: nss on SL5.x i386/x86_64 MIME-Version: 1.0 Message-ID: <20150824195113.14877.30937@slpackages.fnal.gov> Synopsis: Moderate: nss security, bug fix, and enhancement update Advisory ID: SLSA-2015:1664-1 Issue Date: 2015-08-24 CVE Numbers: CVE-2015-2730 CVE-2015-2721 -- It was found that NSS permitted skipping of the ServerKeyExchange packet during a handshake involving ECDHE (Elliptic Curve Diffie-Hellman key Exchange). A remote attacker could use this flaw to bypass the forward- secrecy of a TLS/SSL connection. (CVE-2015-2721) A flaw was found in the way NSS verified certain ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. Under certain conditions, an attacker could use this flaw to conduct signature forgery attacks. (CVE-2015-2730) The nss packages have been upgraded to upstream version 3.19.1, which provides a number of bug fixes and enhancements over the previous version. -- SL5 x86_64 nss-3.19.1-1.el5_11.i386.rpm nss-3.19.1-1.el5_11.x86_64.rpm nss-debuginfo-3.19.1-1.el5_11.i386.rpm nss-debuginfo-3.19.1-1.el5_11.x86_64.rpm nss-tools-3.19.1-1.el5_11.x86_64.rpm nss-devel-3.19.1-1.el5_11.i386.rpm nss-devel-3.19.1-1.el5_11.x86_64.rpm nss-pkcs11-devel-3.19.1-1.el5_11.i386.rpm nss-pkcs11-devel-3.19.1-1.el5_11.x86_64.rpm i386 nss-3.19.1-1.el5_11.i386.rpm nss-debuginfo-3.19.1-1.el5_11.i386.rpm nss-tools-3.19.1-1.el5_11.i386.rpm nss-devel-3.19.1-1.el5_11.i386.rpm nss-pkcs11-devel-3.19.1-1.el5_11.i386.rpm - Scientific Linux Development Team