Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:1037 - Bug Fix Advisory
Issued:
2009-05-18
Updated:
2009-05-18

RHBA-2009:1037 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

nss bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated nss packages that resolve an issue which caused applications to
fail software integrity tests when in FIPS mode are now available.

Description

Network Security Services (NSS) is a set of libraries designed to support
cross-platform development of security-enabled client and server
applications. Applications built with NSS can support SSL v2 and v3, TLS,
PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and
other security standards.

These updated nss packages fix the following bug:

NSS uses a software integrity test to detect code corruption. RPM
transactions and system link optimization daemons (such as prelink) can
change the contents of libraries, causing the software integrity test to
fail. In combination with the updated prelink package, these updated nss
packages can now prevent software integrity test failures.

All users of nss are advised to upgrade to these updated packages, which
resolve this issue.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 491661 - seamonkey/nss FIPS mode failure, update prelink and nss

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
nss-3.12.2.0-4.el4.src.rpm SHA-256: 015c781efc719677954d2440fc727db5f706ee44140cd97950f013445dcd0584
x86_64
nss-3.12.2.0-4.el4.i386.rpm SHA-256: c96a9d352cb3dbf11e1d32375d348747bd35ab059ac378545bba0d4171efff04
nss-3.12.2.0-4.el4.i386.rpm SHA-256: c96a9d352cb3dbf11e1d32375d348747bd35ab059ac378545bba0d4171efff04
nss-3.12.2.0-4.el4.x86_64.rpm SHA-256: 2b9dd86f139e0a741a60328130701685f30f54b3477604c67dcf8a8a1fa29459
nss-3.12.2.0-4.el4.x86_64.rpm SHA-256: 2b9dd86f139e0a741a60328130701685f30f54b3477604c67dcf8a8a1fa29459
nss-devel-3.12.2.0-4.el4.x86_64.rpm SHA-256: f537de8354cbd70a5eb84d8d812aad20fd485f5ee12e360591969bde8259b26c
nss-devel-3.12.2.0-4.el4.x86_64.rpm SHA-256: f537de8354cbd70a5eb84d8d812aad20fd485f5ee12e360591969bde8259b26c
nss-tools-3.12.2.0-4.el4.x86_64.rpm SHA-256: 153d47a4c8b1d78d4f6816a04424cc77d3ce5f22cd8c71b5124b44edf9714fd8
nss-tools-3.12.2.0-4.el4.x86_64.rpm SHA-256: 153d47a4c8b1d78d4f6816a04424cc77d3ce5f22cd8c71b5124b44edf9714fd8
ia64
nss-3.12.2.0-4.el4.i386.rpm SHA-256: c96a9d352cb3dbf11e1d32375d348747bd35ab059ac378545bba0d4171efff04
nss-3.12.2.0-4.el4.i386.rpm SHA-256: c96a9d352cb3dbf11e1d32375d348747bd35ab059ac378545bba0d4171efff04
nss-3.12.2.0-4.el4.ia64.rpm SHA-256: bb92daabb76848d43f7ab3ceb277053087085537b3b01808729f5adf41c4aba5
nss-3.12.2.0-4.el4.ia64.rpm SHA-256: bb92daabb76848d43f7ab3ceb277053087085537b3b01808729f5adf41c4aba5
nss-devel-3.12.2.0-4.el4.ia64.rpm SHA-256: 5c7593346098fdf64cc013006bbe2b1e0180a61edf56ef769a6e41df778dd3be
nss-devel-3.12.2.0-4.el4.ia64.rpm SHA-256: 5c7593346098fdf64cc013006bbe2b1e0180a61edf56ef769a6e41df778dd3be
nss-tools-3.12.2.0-4.el4.ia64.rpm SHA-256: 79b8ccb3c9d94c5cfce6deb6ee3a6dbbe64796c6be4241ac92e53866308fdf96
nss-tools-3.12.2.0-4.el4.ia64.rpm SHA-256: 79b8ccb3c9d94c5cfce6deb6ee3a6dbbe64796c6be4241ac92e53866308fdf96
i386
nss-3.12.2.0-4.el4.i386.rpm SHA-256: c96a9d352cb3dbf11e1d32375d348747bd35ab059ac378545bba0d4171efff04
nss-3.12.2.0-4.el4.i386.rpm SHA-256: c96a9d352cb3dbf11e1d32375d348747bd35ab059ac378545bba0d4171efff04
nss-devel-3.12.2.0-4.el4.i386.rpm SHA-256: eb66b08b2fbb6ea7c9ff758d97b747f9f7aa3cbfd0e2e6f012b8023dcb928af5
nss-devel-3.12.2.0-4.el4.i386.rpm SHA-256: eb66b08b2fbb6ea7c9ff758d97b747f9f7aa3cbfd0e2e6f012b8023dcb928af5
nss-tools-3.12.2.0-4.el4.i386.rpm SHA-256: 3629c3744da562d100266a04a69bef81a569a512a9345c437e2d224d55e71317
nss-tools-3.12.2.0-4.el4.i386.rpm SHA-256: 3629c3744da562d100266a04a69bef81a569a512a9345c437e2d224d55e71317

Red Hat Enterprise Linux Workstation 4

SRPM
nss-3.12.2.0-4.el4.src.rpm SHA-256: 015c781efc719677954d2440fc727db5f706ee44140cd97950f013445dcd0584
x86_64
nss-3.12.2.0-4.el4.i386.rpm SHA-256: c96a9d352cb3dbf11e1d32375d348747bd35ab059ac378545bba0d4171efff04
nss-3.12.2.0-4.el4.x86_64.rpm SHA-256: 2b9dd86f139e0a741a60328130701685f30f54b3477604c67dcf8a8a1fa29459
nss-devel-3.12.2.0-4.el4.x86_64.rpm SHA-256: f537de8354cbd70a5eb84d8d812aad20fd485f5ee12e360591969bde8259b26c
nss-tools-3.12.2.0-4.el4.x86_64.rpm SHA-256: 153d47a4c8b1d78d4f6816a04424cc77d3ce5f22cd8c71b5124b44edf9714fd8
ia64
nss-3.12.2.0-4.el4.i386.rpm SHA-256: c96a9d352cb3dbf11e1d32375d348747bd35ab059ac378545bba0d4171efff04
nss-3.12.2.0-4.el4.ia64.rpm SHA-256: bb92daabb76848d43f7ab3ceb277053087085537b3b01808729f5adf41c4aba5
nss-devel-3.12.2.0-4.el4.ia64.rpm SHA-256: 5c7593346098fdf64cc013006bbe2b1e0180a61edf56ef769a6e41df778dd3be
nss-tools-3.12.2.0-4.el4.ia64.rpm SHA-256: 79b8ccb3c9d94c5cfce6deb6ee3a6dbbe64796c6be4241ac92e53866308fdf96
i386
nss-3.12.2.0-4.el4.i386.rpm SHA-256: c96a9d352cb3dbf11e1d32375d348747bd35ab059ac378545bba0d4171efff04
nss-devel-3.12.2.0-4.el4.i386.rpm SHA-256: eb66b08b2fbb6ea7c9ff758d97b747f9f7aa3cbfd0e2e6f012b8023dcb928af5
nss-tools-3.12.2.0-4.el4.i386.rpm SHA-256: 3629c3744da562d100266a04a69bef81a569a512a9345c437e2d224d55e71317

Red Hat Enterprise Linux Desktop 4

SRPM
nss-3.12.2.0-4.el4.src.rpm SHA-256: 015c781efc719677954d2440fc727db5f706ee44140cd97950f013445dcd0584
x86_64
nss-3.12.2.0-4.el4.i386.rpm SHA-256: c96a9d352cb3dbf11e1d32375d348747bd35ab059ac378545bba0d4171efff04
nss-3.12.2.0-4.el4.x86_64.rpm SHA-256: 2b9dd86f139e0a741a60328130701685f30f54b3477604c67dcf8a8a1fa29459
nss-devel-3.12.2.0-4.el4.x86_64.rpm SHA-256: f537de8354cbd70a5eb84d8d812aad20fd485f5ee12e360591969bde8259b26c
nss-tools-3.12.2.0-4.el4.x86_64.rpm SHA-256: 153d47a4c8b1d78d4f6816a04424cc77d3ce5f22cd8c71b5124b44edf9714fd8
i386
nss-3.12.2.0-4.el4.i386.rpm SHA-256: c96a9d352cb3dbf11e1d32375d348747bd35ab059ac378545bba0d4171efff04
nss-devel-3.12.2.0-4.el4.i386.rpm SHA-256: eb66b08b2fbb6ea7c9ff758d97b747f9f7aa3cbfd0e2e6f012b8023dcb928af5
nss-tools-3.12.2.0-4.el4.i386.rpm SHA-256: 3629c3744da562d100266a04a69bef81a569a512a9345c437e2d224d55e71317

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
nss-3.12.2.0-4.el4.src.rpm SHA-256: 015c781efc719677954d2440fc727db5f706ee44140cd97950f013445dcd0584
s390x
nss-3.12.2.0-4.el4.s390.rpm SHA-256: 6bfd784989c10384285f118a4f55cbffe33f1a7c4816e4596c6570f7a331ec49
nss-3.12.2.0-4.el4.s390x.rpm SHA-256: ad849032306a45517181a69a1ec6d71d45c042d0e943444c85e448c8d087602b
nss-devel-3.12.2.0-4.el4.s390x.rpm SHA-256: 2138a9369f19a781a4c9947fb31e7dfa9285970bde7452168e88a10be318c550
nss-tools-3.12.2.0-4.el4.s390x.rpm SHA-256: d93afc6fc6be260e04702f1f549848aa872c1d21d63a8bee818d6b4d8e3d3357
s390
nss-3.12.2.0-4.el4.s390.rpm SHA-256: 6bfd784989c10384285f118a4f55cbffe33f1a7c4816e4596c6570f7a331ec49
nss-devel-3.12.2.0-4.el4.s390.rpm SHA-256: ff0125cd8b51a4733dccb996106a568bbf31837f9f78e27c0213cc2656565c54
nss-tools-3.12.2.0-4.el4.s390.rpm SHA-256: 3253f8bd5c222e813c1a4ab7a6967f8667aa8eb8105fe6364a8541528197dba7

Red Hat Enterprise Linux for Power, big endian 4

SRPM
nss-3.12.2.0-4.el4.src.rpm SHA-256: 015c781efc719677954d2440fc727db5f706ee44140cd97950f013445dcd0584
ppc
nss-3.12.2.0-4.el4.ppc.rpm SHA-256: ea3e630030ec531b9f544abff041727e7f0482fed044969471565412fb6392cb
nss-3.12.2.0-4.el4.ppc64.rpm SHA-256: 8eac14fbd41ba0c4501ffb7c3cd96ba185d5e36a19a6056515baaced25d2764c
nss-devel-3.12.2.0-4.el4.ppc.rpm SHA-256: e1b8b86cb7b9cbddab257f32dd11cfdf149e400c75836b9f0e0f9b937920c9df
nss-tools-3.12.2.0-4.el4.ppc.rpm SHA-256: 301c703e9f2b1e9cc5b51dcc1ee3c24ee0b12e4daa05db191f17cd16a989c82c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility