- Issued:
- 2009-07-20
- Updated:
- 2009-07-20
RHBA-2009:1161 - Bug Fix Advisory
Synopsis
nspr and nss bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated nspr and nss packages that fix several bugs and add an enhancement
are now available
Description
Netscape Portable Runtime (NSPR) provides platform independence for non-GUI
operating system facilities. These facilities include threads, thread
synchronization, normal file and network I/O, interval timing, calendar
time, basic memory management (malloc and free), and shared library linking.
Network Security Services (NSS) is a set of libraries designed to support
the cross-platform development of security-enabled client and server
applications. Applications built with NSS can support SSLv2, SSLv3, TLS,
and other security standards.
These updated packages upgrade nss from the previous version, 3.12.2, to a
prerelease of version 3.12.4. The version of nspr has also been upgraded,
from 4.7.3 to 4.7.4. These version upgrades provide fixes for the following
bugs:
- SSL client authentication failed against an Apache server when it was
using the mod_nss module and configured for NSSOCSP.
On the client side, the user agent received an error message that
referenced "Error Code: -12271" and stated that establishing an encrypted
connection had failed because the certificate had been rejected by the
host.
On the server side, the nss_error_log under /var/log/httpd/ contained the
following message:
"[error] Re-negotiation handshake failed: Not accepted by client!?"
Also, /var/log/httpd/error_log contained this error message:
"SSL Library Error: -8071 The OCSP server experienced an internal error."
With these updated packages, the dependency problem which caused this
failure has been resolved so that SSL client authentication with an
Apache web server using mod_nss which is configured for NSSOCSP succeeds
as expected. Note that if the presented client certificate is expired,
then access is denied, the user agent is presented with an error message
about the invalid certificate, and the OCSP queries are seen in the OCSP
responder. Also, similar OCSP status verification happens for SSL server
certificates used in Apache upon instance start or restart. (BZ#499052)
- Attempting client authorization with a certificate authority when using
ECC (Elliptic Curve Cryptography) on a machine with a hardware security
module (HSM) failed with an error message stating that the browser (the
test agent in this case) was unable to authenticate to the agent URL. This
has been fixed in these updated packages so that agents are once again able
to authenticate with certificate authorities when using the ECC algorithm
on machines with an HSM. (BZ#223279)
- In addition, these updated packages provide an enhancement to update
cryptography services required by the Openswan package. (BZ#502201)
All users of nspr and nss are advised to upgrade to these updated packages,
which resolve these issues and provide these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-1125.
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
- Red Hat Enterprise Linux Server - AUS 5.3 x86_64
- Red Hat Enterprise Linux Server - AUS 5.3 ia64
- Red Hat Enterprise Linux Server - AUS 5.3 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc
Fixes
- BZ - 502201 - Unable to start/run JAVA applications using NSS-3.12.3
- BZ - 506085 - NSS potentially access random memory during SSL connections
- BZ - 511862 - AVC failure in CVE-2007-4465 due to mod_nss (bad selinux policy)
- BZ - 511868 - To Implement a function which returns the handle for symmetric keys in NSS
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
nspr-4.7.4-1.el5_3.1.src.rpm | SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f |
nss-3.12.3.99.3-1.el5_3.2.src.rpm | SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736 |
x86_64 | |
nspr-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b |
nspr-4.7.4-1.el5_3.1.x86_64.rpm | SHA-256: f3dd78904ca9ec4872e22222cf81493528a4ea4e7c7cb8c52d9321b3043d839e |
nspr-devel-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce |
nspr-devel-4.7.4-1.el5_3.1.x86_64.rpm | SHA-256: b1c1dcc6c66fc1991eaa8dc13754e04abf49774e1ae7ce6fa678e24f8dd71e66 |
nss-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510 |
nss-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: a81458335daa252834cd6f894aa859c7e191baed2fffbd0056f62ac5c40d25a7 |
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152 |
nss-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: 8e046294dd6a7af3b3687ba7a21782b1b3b9aae38e4d5a68887db399d30b2b62 |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5 |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: 11458dd8499cf64b6ab11f506ee98a7d968c57cb9bf85c2d641bf292e12f64b4 |
nss-tools-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: 119a9c5239f5d5fd377016705ef00cc191bd4149b57ebfc6b57eb01f879b5016 |
ia64 | |
nspr-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b |
nspr-4.7.4-1.el5_3.1.ia64.rpm | SHA-256: c66a497dc1db4945d128f6e9d43cb9fdb1ea8dd39f1fba68bf22ff2050f03784 |
nspr-devel-4.7.4-1.el5_3.1.ia64.rpm | SHA-256: 5f3d113326bbd9fa8493041fdf4442588a99ede0ef727e31dc296c2e3e5c0523 |
nss-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510 |
nss-3.12.3.99.3-1.el5_3.2.ia64.rpm | SHA-256: a80e96c48d79090e039404d1427c3a143e89568c4be7bd5ae0b05c0f7ff81295 |
nss-devel-3.12.3.99.3-1.el5_3.2.ia64.rpm | SHA-256: 0d66cd6e64945e6eb5986b71d403ab8b295938d84cde2cf7274f634ec94ccaf9 |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.ia64.rpm | SHA-256: 6f2ab596a6787fe3da631a9197b8cbf0fa78874ff1e1559adbb23d4fa9237f39 |
nss-tools-3.12.3.99.3-1.el5_3.2.ia64.rpm | SHA-256: 545841ce9d336276b560cc8368e4ad85e92967022a6d96d5927a58c748b56b01 |
i386 | |
nspr-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b |
nspr-devel-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce |
nss-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510 |
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152 |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5 |
nss-tools-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 8a6e3673f1e74658939c3cbced97344975f03a91ac1ecc0fefb2260f3345c62a |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3
SRPM | |
---|---|
x86_64 | |
ia64 | |
i386 |
Red Hat Enterprise Linux Server - AUS 5.3
SRPM | |
---|---|
ia64 | |
i386 | |
x86_64 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
nspr-4.7.4-1.el5_3.1.src.rpm | SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f |
nss-3.12.3.99.3-1.el5_3.2.src.rpm | SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736 |
x86_64 | |
nspr-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b |
nspr-4.7.4-1.el5_3.1.x86_64.rpm | SHA-256: f3dd78904ca9ec4872e22222cf81493528a4ea4e7c7cb8c52d9321b3043d839e |
nspr-devel-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce |
nspr-devel-4.7.4-1.el5_3.1.x86_64.rpm | SHA-256: b1c1dcc6c66fc1991eaa8dc13754e04abf49774e1ae7ce6fa678e24f8dd71e66 |
nss-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510 |
nss-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: a81458335daa252834cd6f894aa859c7e191baed2fffbd0056f62ac5c40d25a7 |
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152 |
nss-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: 8e046294dd6a7af3b3687ba7a21782b1b3b9aae38e4d5a68887db399d30b2b62 |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5 |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: 11458dd8499cf64b6ab11f506ee98a7d968c57cb9bf85c2d641bf292e12f64b4 |
nss-tools-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: 119a9c5239f5d5fd377016705ef00cc191bd4149b57ebfc6b57eb01f879b5016 |
i386 | |
nspr-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b |
nspr-devel-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce |
nss-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510 |
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152 |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5 |
nss-tools-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 8a6e3673f1e74658939c3cbced97344975f03a91ac1ecc0fefb2260f3345c62a |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
nspr-4.7.4-1.el5_3.1.src.rpm | SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f |
nss-3.12.3.99.3-1.el5_3.2.src.rpm | SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736 |
x86_64 | |
nspr-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b |
nspr-4.7.4-1.el5_3.1.x86_64.rpm | SHA-256: f3dd78904ca9ec4872e22222cf81493528a4ea4e7c7cb8c52d9321b3043d839e |
nss-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510 |
nss-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: a81458335daa252834cd6f894aa859c7e191baed2fffbd0056f62ac5c40d25a7 |
nss-tools-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: 119a9c5239f5d5fd377016705ef00cc191bd4149b57ebfc6b57eb01f879b5016 |
i386 | |
nspr-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b |
nss-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510 |
nss-tools-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 8a6e3673f1e74658939c3cbced97344975f03a91ac1ecc0fefb2260f3345c62a |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
nspr-4.7.4-1.el5_3.1.src.rpm | SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f |
nss-3.12.3.99.3-1.el5_3.2.src.rpm | SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736 |
s390x | |
nspr-4.7.4-1.el5_3.1.s390.rpm | SHA-256: 53c6b1479d2c7678af2c3b4400b4336b48f272b4a22bb33402222dc66d450dea |
nspr-4.7.4-1.el5_3.1.s390x.rpm | SHA-256: ce80673d292f05b626f6ba5e9078825022bcdba7b945fb04ce4ab101a1f0aec8 |
nspr-devel-4.7.4-1.el5_3.1.s390.rpm | SHA-256: 422a9201b6e19d8649672fe523423d3cdf262a3d2ab9c34c2617bf16a60c8229 |
nspr-devel-4.7.4-1.el5_3.1.s390x.rpm | SHA-256: ed3a1953af284e85d91b9d93a9ab5275af600c7b0a0114809da1f86eea3527c8 |
nss-3.12.3.99.3-1.el5_3.2.s390.rpm | SHA-256: eec1aca74feb7926b78d34c03424c21eacef69f448397dd499031135192862e6 |
nss-3.12.3.99.3-1.el5_3.2.s390x.rpm | SHA-256: 63853dcbe61b3248def76363048954220d1a6531b667ceffe10219b373a2207b |
nss-devel-3.12.3.99.3-1.el5_3.2.s390.rpm | SHA-256: 57bb5b3f88984d0efbb01ed5990cf34e76398bad1265e0db22e1d86566cfd593 |
nss-devel-3.12.3.99.3-1.el5_3.2.s390x.rpm | SHA-256: bec39a4b46eb89483af725f16e5524aff58ae08d4611491acf2ba820294be2ca |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.s390.rpm | SHA-256: dcbe1b127a033d8b36f35bc9159449544c424e392c11c37192c29b4b6a5b4cff |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.s390x.rpm | SHA-256: c54b9db0749cc5937047c4debb304977759aed603f3546d8a1ed1abad2f81d6e |
nss-tools-3.12.3.99.3-1.el5_3.2.s390x.rpm | SHA-256: 943fef970f7be2da5f3e9efcfb597aff4c6b2f335d8a54b27478b66d4dd673e6 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3
SRPM | |
---|---|
s390x |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
nspr-4.7.4-1.el5_3.1.src.rpm | SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f |
nss-3.12.3.99.3-1.el5_3.2.src.rpm | SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736 |
ppc | |
nspr-4.7.4-1.el5_3.1.ppc.rpm | SHA-256: 76a6cac4fa2472ae661f2b5d29569a80c58dd9132d52a4816d0ea0b897cdff0e |
nspr-4.7.4-1.el5_3.1.ppc64.rpm | SHA-256: 69c1b99cdbd9c8343682e61a318282a51446b80229ed90cd0e4745e6c9aeedf5 |
nspr-devel-4.7.4-1.el5_3.1.ppc.rpm | SHA-256: 1f69a4cdbc55f78910743f1af2de4e477216b3c2ab59ccfb7f7918224f1f6705 |
nspr-devel-4.7.4-1.el5_3.1.ppc64.rpm | SHA-256: 7d33539d76f1cf5df2270cf4123a163570ba4ce18f02072a1770ce79f0537073 |
nss-3.12.3.99.3-1.el5_3.2.ppc.rpm | SHA-256: 8905726bcc248c6b066370aced66ebc42b1c5dc1cf29e4235ff6b1b79071cd06 |
nss-3.12.3.99.3-1.el5_3.2.ppc64.rpm | SHA-256: 6c3db656204092ab005a04e6e4e3e803f8538f85a4345d23342b9f07738f7870 |
nss-devel-3.12.3.99.3-1.el5_3.2.ppc.rpm | SHA-256: b863a75efaf6bcba0b3aabc3173f0649840ae1ed041c77f258e3bc3b927e4b03 |
nss-devel-3.12.3.99.3-1.el5_3.2.ppc64.rpm | SHA-256: a2186acf2043179d4331cee5309aab87a77e543897e56aab853043ce399148a0 |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.ppc.rpm | SHA-256: bb55c8bd1765c2e294eb846482d4f407674ae03f2db5944c938059122cb8a3e6 |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.ppc64.rpm | SHA-256: 00c60a3d567f7b10e61970bca34df7f3e94778af3f12c5434430491ec18040ce |
nss-tools-3.12.3.99.3-1.el5_3.2.ppc.rpm | SHA-256: 261281f38ead671252e70c09c2d04260778a970bec8e15fa2446ea854cd631fb |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
nspr-4.7.4-1.el5_3.1.src.rpm | SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f |
nss-3.12.3.99.3-1.el5_3.2.src.rpm | SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736 |
x86_64 | |
nspr-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b |
nspr-4.7.4-1.el5_3.1.x86_64.rpm | SHA-256: f3dd78904ca9ec4872e22222cf81493528a4ea4e7c7cb8c52d9321b3043d839e |
nspr-devel-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce |
nspr-devel-4.7.4-1.el5_3.1.x86_64.rpm | SHA-256: b1c1dcc6c66fc1991eaa8dc13754e04abf49774e1ae7ce6fa678e24f8dd71e66 |
nss-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510 |
nss-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: a81458335daa252834cd6f894aa859c7e191baed2fffbd0056f62ac5c40d25a7 |
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152 |
nss-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: 8e046294dd6a7af3b3687ba7a21782b1b3b9aae38e4d5a68887db399d30b2b62 |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5 |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: 11458dd8499cf64b6ab11f506ee98a7d968c57cb9bf85c2d641bf292e12f64b4 |
nss-tools-3.12.3.99.3-1.el5_3.2.x86_64.rpm | SHA-256: 119a9c5239f5d5fd377016705ef00cc191bd4149b57ebfc6b57eb01f879b5016 |
i386 | |
nspr-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b |
nspr-devel-4.7.4-1.el5_3.1.i386.rpm | SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce |
nss-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510 |
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152 |
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5 |
nss-tools-3.12.3.99.3-1.el5_3.2.i386.rpm | SHA-256: 8a6e3673f1e74658939c3cbced97344975f03a91ac1ecc0fefb2260f3345c62a |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3
SRPM | |
---|---|
ppc |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.