Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:1161 - Bug Fix Advisory
Issued:
2009-07-20
Updated:
2009-07-20

RHBA-2009:1161 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

nspr and nss bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated nspr and nss packages that fix several bugs and add an enhancement
are now available

Description

Netscape Portable Runtime (NSPR) provides platform independence for non-GUI
operating system facilities. These facilities include threads, thread
synchronization, normal file and network I/O, interval timing, calendar
time, basic memory management (malloc and free), and shared library linking.

Network Security Services (NSS) is a set of libraries designed to support
the cross-platform development of security-enabled client and server
applications. Applications built with NSS can support SSLv2, SSLv3, TLS,
and other security standards.

These updated packages upgrade nss from the previous version, 3.12.2, to a
prerelease of version 3.12.4. The version of nspr has also been upgraded,
from 4.7.3 to 4.7.4. These version upgrades provide fixes for the following
bugs:

  • SSL client authentication failed against an Apache server when it was

using the mod_nss module and configured for NSSOCSP.

On the client side, the user agent received an error message that
referenced "Error Code: -12271" and stated that establishing an encrypted
connection had failed because the certificate had been rejected by the
host.

On the server side, the nss_error_log under /var/log/httpd/ contained the
following message:
"[error] Re-negotiation handshake failed: Not accepted by client!?"

Also, /var/log/httpd/error_log contained this error message:
"SSL Library Error: -8071 The OCSP server experienced an internal error."

With these updated packages, the dependency problem which caused this
failure has been resolved so that SSL client authentication with an
Apache web server using mod_nss which is configured for NSSOCSP succeeds
as expected. Note that if the presented client certificate is expired,
then access is denied, the user agent is presented with an error message
about the invalid certificate, and the OCSP queries are seen in the OCSP
responder. Also, similar OCSP status verification happens for SSL server
certificates used in Apache upon instance start or restart. (BZ#499052)

  • Attempting client authorization with a certificate authority when using

ECC (Elliptic Curve Cryptography) on a machine with a hardware security
module (HSM) failed with an error message stating that the browser (the
test agent in this case) was unable to authenticate to the agent URL. This
has been fixed in these updated packages so that agents are once again able
to authenticate with certificate authorities when using the ECC algorithm
on machines with an HSM. (BZ#223279)

  • In addition, these updated packages provide an enhancement to update

cryptography services required by the Openswan package. (BZ#502201)

All users of nspr and nss are advised to upgrade to these updated packages,
which resolve these issues and provide these enhancements.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-1125.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386
  • Red Hat Enterprise Linux Server - AUS 5.3 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.3 ia64
  • Red Hat Enterprise Linux Server - AUS 5.3 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc

Fixes

  • BZ - 502201 - Unable to start/run JAVA applications using NSS-3.12.3
  • BZ - 506085 - NSS potentially access random memory during SSL connections
  • BZ - 511862 - AVC failure in CVE-2007-4465 due to mod_nss (bad selinux policy)
  • BZ - 511868 - To Implement a function which returns the handle for symmetric keys in NSS

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
nspr-4.7.4-1.el5_3.1.src.rpm SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f
nss-3.12.3.99.3-1.el5_3.2.src.rpm SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736
x86_64
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: f3dd78904ca9ec4872e22222cf81493528a4ea4e7c7cb8c52d9321b3043d839e
nspr-devel-4.7.4-1.el5_3.1.i386.rpm SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce
nspr-devel-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: b1c1dcc6c66fc1991eaa8dc13754e04abf49774e1ae7ce6fa678e24f8dd71e66
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: a81458335daa252834cd6f894aa859c7e191baed2fffbd0056f62ac5c40d25a7
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152
nss-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 8e046294dd6a7af3b3687ba7a21782b1b3b9aae38e4d5a68887db399d30b2b62
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 11458dd8499cf64b6ab11f506ee98a7d968c57cb9bf85c2d641bf292e12f64b4
nss-tools-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 119a9c5239f5d5fd377016705ef00cc191bd4149b57ebfc6b57eb01f879b5016
ia64
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-4.7.4-1.el5_3.1.ia64.rpm SHA-256: c66a497dc1db4945d128f6e9d43cb9fdb1ea8dd39f1fba68bf22ff2050f03784
nspr-devel-4.7.4-1.el5_3.1.ia64.rpm SHA-256: 5f3d113326bbd9fa8493041fdf4442588a99ede0ef727e31dc296c2e3e5c0523
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-3.12.3.99.3-1.el5_3.2.ia64.rpm SHA-256: a80e96c48d79090e039404d1427c3a143e89568c4be7bd5ae0b05c0f7ff81295
nss-devel-3.12.3.99.3-1.el5_3.2.ia64.rpm SHA-256: 0d66cd6e64945e6eb5986b71d403ab8b295938d84cde2cf7274f634ec94ccaf9
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.ia64.rpm SHA-256: 6f2ab596a6787fe3da631a9197b8cbf0fa78874ff1e1559adbb23d4fa9237f39
nss-tools-3.12.3.99.3-1.el5_3.2.ia64.rpm SHA-256: 545841ce9d336276b560cc8368e4ad85e92967022a6d96d5927a58c748b56b01
i386
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-devel-4.7.4-1.el5_3.1.i386.rpm SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5
nss-tools-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 8a6e3673f1e74658939c3cbced97344975f03a91ac1ecc0fefb2260f3345c62a

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Server - AUS 5.3

SRPM
ia64
i386
x86_64

Red Hat Enterprise Linux Workstation 5

SRPM
nspr-4.7.4-1.el5_3.1.src.rpm SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f
nss-3.12.3.99.3-1.el5_3.2.src.rpm SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736
x86_64
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: f3dd78904ca9ec4872e22222cf81493528a4ea4e7c7cb8c52d9321b3043d839e
nspr-devel-4.7.4-1.el5_3.1.i386.rpm SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce
nspr-devel-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: b1c1dcc6c66fc1991eaa8dc13754e04abf49774e1ae7ce6fa678e24f8dd71e66
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: a81458335daa252834cd6f894aa859c7e191baed2fffbd0056f62ac5c40d25a7
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152
nss-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 8e046294dd6a7af3b3687ba7a21782b1b3b9aae38e4d5a68887db399d30b2b62
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 11458dd8499cf64b6ab11f506ee98a7d968c57cb9bf85c2d641bf292e12f64b4
nss-tools-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 119a9c5239f5d5fd377016705ef00cc191bd4149b57ebfc6b57eb01f879b5016
i386
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-devel-4.7.4-1.el5_3.1.i386.rpm SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5
nss-tools-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 8a6e3673f1e74658939c3cbced97344975f03a91ac1ecc0fefb2260f3345c62a

Red Hat Enterprise Linux Desktop 5

SRPM
nspr-4.7.4-1.el5_3.1.src.rpm SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f
nss-3.12.3.99.3-1.el5_3.2.src.rpm SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736
x86_64
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: f3dd78904ca9ec4872e22222cf81493528a4ea4e7c7cb8c52d9321b3043d839e
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: a81458335daa252834cd6f894aa859c7e191baed2fffbd0056f62ac5c40d25a7
nss-tools-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 119a9c5239f5d5fd377016705ef00cc191bd4149b57ebfc6b57eb01f879b5016
i386
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-tools-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 8a6e3673f1e74658939c3cbced97344975f03a91ac1ecc0fefb2260f3345c62a

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
nspr-4.7.4-1.el5_3.1.src.rpm SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f
nss-3.12.3.99.3-1.el5_3.2.src.rpm SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736
s390x
nspr-4.7.4-1.el5_3.1.s390.rpm SHA-256: 53c6b1479d2c7678af2c3b4400b4336b48f272b4a22bb33402222dc66d450dea
nspr-4.7.4-1.el5_3.1.s390x.rpm SHA-256: ce80673d292f05b626f6ba5e9078825022bcdba7b945fb04ce4ab101a1f0aec8
nspr-devel-4.7.4-1.el5_3.1.s390.rpm SHA-256: 422a9201b6e19d8649672fe523423d3cdf262a3d2ab9c34c2617bf16a60c8229
nspr-devel-4.7.4-1.el5_3.1.s390x.rpm SHA-256: ed3a1953af284e85d91b9d93a9ab5275af600c7b0a0114809da1f86eea3527c8
nss-3.12.3.99.3-1.el5_3.2.s390.rpm SHA-256: eec1aca74feb7926b78d34c03424c21eacef69f448397dd499031135192862e6
nss-3.12.3.99.3-1.el5_3.2.s390x.rpm SHA-256: 63853dcbe61b3248def76363048954220d1a6531b667ceffe10219b373a2207b
nss-devel-3.12.3.99.3-1.el5_3.2.s390.rpm SHA-256: 57bb5b3f88984d0efbb01ed5990cf34e76398bad1265e0db22e1d86566cfd593
nss-devel-3.12.3.99.3-1.el5_3.2.s390x.rpm SHA-256: bec39a4b46eb89483af725f16e5524aff58ae08d4611491acf2ba820294be2ca
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.s390.rpm SHA-256: dcbe1b127a033d8b36f35bc9159449544c424e392c11c37192c29b4b6a5b4cff
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.s390x.rpm SHA-256: c54b9db0749cc5937047c4debb304977759aed603f3546d8a1ed1abad2f81d6e
nss-tools-3.12.3.99.3-1.el5_3.2.s390x.rpm SHA-256: 943fef970f7be2da5f3e9efcfb597aff4c6b2f335d8a54b27478b66d4dd673e6

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
nspr-4.7.4-1.el5_3.1.src.rpm SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f
nss-3.12.3.99.3-1.el5_3.2.src.rpm SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736
ppc
nspr-4.7.4-1.el5_3.1.ppc.rpm SHA-256: 76a6cac4fa2472ae661f2b5d29569a80c58dd9132d52a4816d0ea0b897cdff0e
nspr-4.7.4-1.el5_3.1.ppc64.rpm SHA-256: 69c1b99cdbd9c8343682e61a318282a51446b80229ed90cd0e4745e6c9aeedf5
nspr-devel-4.7.4-1.el5_3.1.ppc.rpm SHA-256: 1f69a4cdbc55f78910743f1af2de4e477216b3c2ab59ccfb7f7918224f1f6705
nspr-devel-4.7.4-1.el5_3.1.ppc64.rpm SHA-256: 7d33539d76f1cf5df2270cf4123a163570ba4ce18f02072a1770ce79f0537073
nss-3.12.3.99.3-1.el5_3.2.ppc.rpm SHA-256: 8905726bcc248c6b066370aced66ebc42b1c5dc1cf29e4235ff6b1b79071cd06
nss-3.12.3.99.3-1.el5_3.2.ppc64.rpm SHA-256: 6c3db656204092ab005a04e6e4e3e803f8538f85a4345d23342b9f07738f7870
nss-devel-3.12.3.99.3-1.el5_3.2.ppc.rpm SHA-256: b863a75efaf6bcba0b3aabc3173f0649840ae1ed041c77f258e3bc3b927e4b03
nss-devel-3.12.3.99.3-1.el5_3.2.ppc64.rpm SHA-256: a2186acf2043179d4331cee5309aab87a77e543897e56aab853043ce399148a0
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.ppc.rpm SHA-256: bb55c8bd1765c2e294eb846482d4f407674ae03f2db5944c938059122cb8a3e6
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.ppc64.rpm SHA-256: 00c60a3d567f7b10e61970bca34df7f3e94778af3f12c5434430491ec18040ce
nss-tools-3.12.3.99.3-1.el5_3.2.ppc.rpm SHA-256: 261281f38ead671252e70c09c2d04260778a970bec8e15fa2446ea854cd631fb

Red Hat Enterprise Linux Server from RHUI 5

SRPM
nspr-4.7.4-1.el5_3.1.src.rpm SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f
nss-3.12.3.99.3-1.el5_3.2.src.rpm SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736
x86_64
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: f3dd78904ca9ec4872e22222cf81493528a4ea4e7c7cb8c52d9321b3043d839e
nspr-devel-4.7.4-1.el5_3.1.i386.rpm SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce
nspr-devel-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: b1c1dcc6c66fc1991eaa8dc13754e04abf49774e1ae7ce6fa678e24f8dd71e66
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: a81458335daa252834cd6f894aa859c7e191baed2fffbd0056f62ac5c40d25a7
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152
nss-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 8e046294dd6a7af3b3687ba7a21782b1b3b9aae38e4d5a68887db399d30b2b62
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 11458dd8499cf64b6ab11f506ee98a7d968c57cb9bf85c2d641bf292e12f64b4
nss-tools-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 119a9c5239f5d5fd377016705ef00cc191bd4149b57ebfc6b57eb01f879b5016
i386
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-devel-4.7.4-1.el5_3.1.i386.rpm SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5
nss-tools-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 8a6e3673f1e74658939c3cbced97344975f03a91ac1ecc0fefb2260f3345c62a

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3

SRPM
ppc

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility