[ALSA-2021:3572] Moderate: nss and nspr security, bug fix, and enhancement update
Type:
security
Severity:
moderate
Release date:
2021-11-12
Description:
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.67.0), nspr (4.32.0). (BZ#1967980) Security Fix(es): * nss: TLS 1.3 CCS flood remote DoS Attack (CVE-2020-25648) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * 8025 error code when creating subCAs (BZ#1977412) * NSS cannot use SQL databases created by specific versions of NSS (BZ#1978443) * Inconsistent handling of malformed CertificateRequest messages (BZ#1980050) Enhancement(s): * [IBM 8.5 FEAT] [P10] POWER10 performance enhancements for cryptography: NSS FreeBL (BZ#1978257)
Updated packages listed below:
Architecture Package Checksum
aarch64 nspr-devel-4.32.0-1.el8_4.aarch64.rpm 92459c12b2615a6c51b7167dca002952a9178951de627244d84fe67e618b46f5
aarch64 nspr-4.32.0-1.el8_4.aarch64.rpm 976f796f30ff866c98a8cc1c96b3d82a83606f4b4c7fbb2e9ec682cbae3417e6
i686 nss-softokn-freebl-3.67.0-6.el8_4.i686.rpm 0eae7957b247bad7874681c707c8c98d014e0408e998cb55a76e7c19c27d8c75
i686 nss-3.67.0-6.el8_4.i686.rpm 1ac8d6475f37ae368cd1135aee8947ef2723e20d26c5f938e82ce38fb78d564b
i686 nss-devel-3.67.0-6.el8_4.i686.rpm 2863aed206dd0af2a752050946720a547d2e93cd8313b9b986a75dd2bd19459f
i686 nss-softokn-freebl-devel-3.67.0-6.el8_4.i686.rpm 2f9e845457e1a2407da96dceecb55838670081313e97ee8acc2a5f4a4232f679
i686 nss-util-devel-3.67.0-6.el8_4.i686.rpm 3b5d6aabfdef6b6221be6177d621cec63f512b061b054bf93ffb68eacb6f0066
i686 nspr-devel-4.32.0-1.el8_4.i686.rpm 441bbc611a8110ad5de3597a165a0f289c9bf697a5fa1c05a0d2c3f1851d86be
i686 nss-softokn-3.67.0-6.el8_4.i686.rpm 6fd4b0758d0445845c1092e99aab28be101107560807a7d6ab6341bcb0fe2b8d
i686 nss-util-3.67.0-6.el8_4.i686.rpm 7d454c891ca82281d298d1724e41856a133694c8309bb2f433c04dce89570c3d
i686 nspr-4.32.0-1.el8_4.i686.rpm b65f154f902513126692360ae53ec649ec5879c78adb1c4f509333804d7db461
i686 nss-softokn-devel-3.67.0-6.el8_4.i686.rpm ddfe21922265c77379112124bd218840bf58f18abc625e347248f89f2a5ff2a0
ppc64le nspr-4.32.0-1.el8_4.ppc64le.rpm 73a8b4b27db6e8659a916d0ece777956ee60cc3d70d1204de977a5079028388b
ppc64le nspr-devel-4.32.0-1.el8_4.ppc64le.rpm ebedcc82748ff196ba657bf5a0026617ceb2288d07f863cc4bdee8ad2224b2cb
x86_64 nss-sysinit-3.67.0-6.el8_4.x86_64.rpm 0e210a1f4daf227daf51152bf30a5ae67f037db0c3ce44423a62a65a64e580e1
x86_64 nss-util-3.67.0-6.el8_4.x86_64.rpm 748b6117a4a4c3b24d4500297f5295c951bdb033ae23bde48897e96033e77874
x86_64 nspr-4.32.0-1.el8_4.x86_64.rpm 7582b3e3bc87e6b386ec5837ef5391afc6258a7098aab5d6ab0997f44c1302a2
x86_64 nss-tools-3.67.0-6.el8_4.x86_64.rpm 78e83a29d7803fee7bf62539ae6acf37bf3631c95425d8549ab9c2120b4c9824
x86_64 nss-devel-3.67.0-6.el8_4.x86_64.rpm a75c0c6a3149e6271fab0b78e4729597f51a248faf56c88fd401fd86bee44171
x86_64 nss-softokn-devel-3.67.0-6.el8_4.x86_64.rpm d4974ffb5458f070cb5e4cfdc0c08afd4ba20107b2484c3237004193418a47a2
x86_64 nss-softokn-freebl-3.67.0-6.el8_4.x86_64.rpm d896aedb31456cbe0096dae39e52337b16f3e751fa704aec9100b9c121ed10e5
x86_64 nspr-devel-4.32.0-1.el8_4.x86_64.rpm dafe0dd7230ed22dc4a20bc3b1127475b9b9e228aa97b77c938676d8b8fdd469
x86_64 nss-softokn-3.67.0-6.el8_4.x86_64.rpm e66d78eec538d2ffbf405cf291a435874e5c80ebf6fcfbd2b83fcc9137a717c1
x86_64 nss-softokn-freebl-devel-3.67.0-6.el8_4.x86_64.rpm ea1ff4e80cd1b48c8f3f029066820f481381b9f682df359f9760641ae134f17d
x86_64 nss-util-devel-3.67.0-6.el8_4.x86_64.rpm fad2a3ff1050a75cdee50bb504940734e25866740b3ac9153139555d2a055265
x86_64 nss-3.67.0-6.el8_4.x86_64.rpm fdbcc3343f1485463d1a0590ffd77d48c7e0e683d251394da154a6e836fb4375
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.