Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2009:1186 - Security Advisory
Issued:
2009-07-30
Updated:
2009-07-30

RHSA-2009:1186 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: nspr and nss security, bug fix, and enhancement update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated nspr and nss packages that fix security issues, bugs, and add an
enhancement are now available for Red Hat Enterprise Linux 5.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

The packages with this update are identical to the packages released by
RHBA-2009:1161 on the 20th of July 2009. They are being reissued as a Red
Hat Security Advisory as they fixed a number of security issues that were
made public today. If you are installing these packages for the first time,
they also provide a number of bug fixes and add an enhancement, as detailed
in RHBA-2009:1161. Since the packages are identical, there is no need to
install this update if RHBA-2009:1161 has already been installed.

Description

Netscape Portable Runtime (NSPR) provides platform independence for non-GUI
operating system facilities. These facilities include threads, thread
synchronization, normal file and network I/O, interval timing, calendar
time, basic memory management (malloc and free), and shared library linking.

Network Security Services (NSS) is a set of libraries designed to support
the cross-platform development of security-enabled client and server
applications. Applications built with NSS can support SSLv2, SSLv3, TLS,
and other security standards.

These updated packages upgrade NSS from the previous version, 3.12.2, to a
prerelease of version 3.12.4. The version of NSPR has also been upgraded
from 4.7.3 to 4.7.4.

Moxie Marlinspike reported a heap overflow flaw in a regular expression
parser in the NSS library used by browsers such as Mozilla Firefox to match
common names in certificates. A malicious website could present a
carefully-crafted certificate in such a way as to trigger the heap
overflow, leading to a crash or, possibly, arbitrary code execution with
the permissions of the user running the browser. (CVE-2009-2404)

Note: in order to exploit this issue without further user interaction in
Firefox, the carefully-crafted certificate would need to be signed by a
Certificate Authority trusted by Firefox, otherwise Firefox presents the
victim with a warning that the certificate is untrusted. Only if the user
then accepts the certificate will the overflow take place.

Dan Kaminsky discovered flaws in the way browsers such as Firefox handle
NULL characters in a certificate. If an attacker is able to get a
carefully-crafted certificate signed by a Certificate Authority trusted by
Firefox, the attacker could use the certificate during a man-in-the-middle
attack and potentially confuse Firefox into accepting it by mistake.
(CVE-2009-2408)

Dan Kaminsky found that browsers still accept certificates with MD2 hash
signatures, even though MD2 is no longer considered a cryptographically
strong algorithm. This could make it easier for an attacker to create a
malicious certificate that would be treated as trusted by a browser. NSS
now disables the use of MD2 and MD4 algorithms inside signatures by
default. (CVE-2009-2409)

All users of nspr and nss are advised to upgrade to these updated packages,
which resolve these issues and add an enhancement.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386
  • Red Hat Enterprise Linux Server - AUS 5.3 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.3 ia64
  • Red Hat Enterprise Linux Server - AUS 5.3 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc

Fixes

  • BZ - 510197 - CVE-2009-2409 deprecate MD2 in SSL cert validation (Kaminsky)
  • BZ - 510251 - CVE-2009-2408 firefox/nss: doesn't handle NULL in Common Name properly
  • BZ - 512912 - CVE-2009-2404 nss regexp heap overflow

CVEs

  • CVE-2009-2404
  • CVE-2009-2408
  • CVE-2009-2409

References

  • http://www.redhat.com/security/updates/classification/#critical
  • http://rhn.redhat.com/errata/RHBA-2009-1161.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
nspr-4.7.4-1.el5_3.1.src.rpm SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f
nss-3.12.3.99.3-1.el5_3.2.src.rpm SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736
x86_64
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: f3dd78904ca9ec4872e22222cf81493528a4ea4e7c7cb8c52d9321b3043d839e
nspr-devel-4.7.4-1.el5_3.1.i386.rpm SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce
nspr-devel-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: b1c1dcc6c66fc1991eaa8dc13754e04abf49774e1ae7ce6fa678e24f8dd71e66
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: a81458335daa252834cd6f894aa859c7e191baed2fffbd0056f62ac5c40d25a7
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152
nss-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 8e046294dd6a7af3b3687ba7a21782b1b3b9aae38e4d5a68887db399d30b2b62
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 11458dd8499cf64b6ab11f506ee98a7d968c57cb9bf85c2d641bf292e12f64b4
nss-tools-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 119a9c5239f5d5fd377016705ef00cc191bd4149b57ebfc6b57eb01f879b5016
ia64
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-4.7.4-1.el5_3.1.ia64.rpm SHA-256: c66a497dc1db4945d128f6e9d43cb9fdb1ea8dd39f1fba68bf22ff2050f03784
nspr-devel-4.7.4-1.el5_3.1.ia64.rpm SHA-256: 5f3d113326bbd9fa8493041fdf4442588a99ede0ef727e31dc296c2e3e5c0523
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-3.12.3.99.3-1.el5_3.2.ia64.rpm SHA-256: a80e96c48d79090e039404d1427c3a143e89568c4be7bd5ae0b05c0f7ff81295
nss-devel-3.12.3.99.3-1.el5_3.2.ia64.rpm SHA-256: 0d66cd6e64945e6eb5986b71d403ab8b295938d84cde2cf7274f634ec94ccaf9
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.ia64.rpm SHA-256: 6f2ab596a6787fe3da631a9197b8cbf0fa78874ff1e1559adbb23d4fa9237f39
nss-tools-3.12.3.99.3-1.el5_3.2.ia64.rpm SHA-256: 545841ce9d336276b560cc8368e4ad85e92967022a6d96d5927a58c748b56b01
i386
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-devel-4.7.4-1.el5_3.1.i386.rpm SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5
nss-tools-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 8a6e3673f1e74658939c3cbced97344975f03a91ac1ecc0fefb2260f3345c62a

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Server - AUS 5.3

SRPM
ia64
i386
x86_64

Red Hat Enterprise Linux Workstation 5

SRPM
nspr-4.7.4-1.el5_3.1.src.rpm SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f
nss-3.12.3.99.3-1.el5_3.2.src.rpm SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736
x86_64
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: f3dd78904ca9ec4872e22222cf81493528a4ea4e7c7cb8c52d9321b3043d839e
nspr-devel-4.7.4-1.el5_3.1.i386.rpm SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce
nspr-devel-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: b1c1dcc6c66fc1991eaa8dc13754e04abf49774e1ae7ce6fa678e24f8dd71e66
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: a81458335daa252834cd6f894aa859c7e191baed2fffbd0056f62ac5c40d25a7
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152
nss-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 8e046294dd6a7af3b3687ba7a21782b1b3b9aae38e4d5a68887db399d30b2b62
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 11458dd8499cf64b6ab11f506ee98a7d968c57cb9bf85c2d641bf292e12f64b4
nss-tools-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 119a9c5239f5d5fd377016705ef00cc191bd4149b57ebfc6b57eb01f879b5016
i386
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-devel-4.7.4-1.el5_3.1.i386.rpm SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5
nss-tools-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 8a6e3673f1e74658939c3cbced97344975f03a91ac1ecc0fefb2260f3345c62a

Red Hat Enterprise Linux Desktop 5

SRPM
nspr-4.7.4-1.el5_3.1.src.rpm SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f
nss-3.12.3.99.3-1.el5_3.2.src.rpm SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736
x86_64
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: f3dd78904ca9ec4872e22222cf81493528a4ea4e7c7cb8c52d9321b3043d839e
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: a81458335daa252834cd6f894aa859c7e191baed2fffbd0056f62ac5c40d25a7
nss-tools-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 119a9c5239f5d5fd377016705ef00cc191bd4149b57ebfc6b57eb01f879b5016
i386
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-tools-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 8a6e3673f1e74658939c3cbced97344975f03a91ac1ecc0fefb2260f3345c62a

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
nspr-4.7.4-1.el5_3.1.src.rpm SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f
nss-3.12.3.99.3-1.el5_3.2.src.rpm SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736
s390x
nspr-4.7.4-1.el5_3.1.s390.rpm SHA-256: 53c6b1479d2c7678af2c3b4400b4336b48f272b4a22bb33402222dc66d450dea
nspr-4.7.4-1.el5_3.1.s390x.rpm SHA-256: ce80673d292f05b626f6ba5e9078825022bcdba7b945fb04ce4ab101a1f0aec8
nspr-devel-4.7.4-1.el5_3.1.s390.rpm SHA-256: 422a9201b6e19d8649672fe523423d3cdf262a3d2ab9c34c2617bf16a60c8229
nspr-devel-4.7.4-1.el5_3.1.s390x.rpm SHA-256: ed3a1953af284e85d91b9d93a9ab5275af600c7b0a0114809da1f86eea3527c8
nss-3.12.3.99.3-1.el5_3.2.s390.rpm SHA-256: eec1aca74feb7926b78d34c03424c21eacef69f448397dd499031135192862e6
nss-3.12.3.99.3-1.el5_3.2.s390x.rpm SHA-256: 63853dcbe61b3248def76363048954220d1a6531b667ceffe10219b373a2207b
nss-devel-3.12.3.99.3-1.el5_3.2.s390.rpm SHA-256: 57bb5b3f88984d0efbb01ed5990cf34e76398bad1265e0db22e1d86566cfd593
nss-devel-3.12.3.99.3-1.el5_3.2.s390x.rpm SHA-256: bec39a4b46eb89483af725f16e5524aff58ae08d4611491acf2ba820294be2ca
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.s390.rpm SHA-256: dcbe1b127a033d8b36f35bc9159449544c424e392c11c37192c29b4b6a5b4cff
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.s390x.rpm SHA-256: c54b9db0749cc5937047c4debb304977759aed603f3546d8a1ed1abad2f81d6e
nss-tools-3.12.3.99.3-1.el5_3.2.s390x.rpm SHA-256: 943fef970f7be2da5f3e9efcfb597aff4c6b2f335d8a54b27478b66d4dd673e6

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
nspr-4.7.4-1.el5_3.1.src.rpm SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f
nss-3.12.3.99.3-1.el5_3.2.src.rpm SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736
ppc
nspr-4.7.4-1.el5_3.1.ppc.rpm SHA-256: 76a6cac4fa2472ae661f2b5d29569a80c58dd9132d52a4816d0ea0b897cdff0e
nspr-4.7.4-1.el5_3.1.ppc64.rpm SHA-256: 69c1b99cdbd9c8343682e61a318282a51446b80229ed90cd0e4745e6c9aeedf5
nspr-devel-4.7.4-1.el5_3.1.ppc.rpm SHA-256: 1f69a4cdbc55f78910743f1af2de4e477216b3c2ab59ccfb7f7918224f1f6705
nspr-devel-4.7.4-1.el5_3.1.ppc64.rpm SHA-256: 7d33539d76f1cf5df2270cf4123a163570ba4ce18f02072a1770ce79f0537073
nss-3.12.3.99.3-1.el5_3.2.ppc.rpm SHA-256: 8905726bcc248c6b066370aced66ebc42b1c5dc1cf29e4235ff6b1b79071cd06
nss-3.12.3.99.3-1.el5_3.2.ppc64.rpm SHA-256: 6c3db656204092ab005a04e6e4e3e803f8538f85a4345d23342b9f07738f7870
nss-devel-3.12.3.99.3-1.el5_3.2.ppc.rpm SHA-256: b863a75efaf6bcba0b3aabc3173f0649840ae1ed041c77f258e3bc3b927e4b03
nss-devel-3.12.3.99.3-1.el5_3.2.ppc64.rpm SHA-256: a2186acf2043179d4331cee5309aab87a77e543897e56aab853043ce399148a0
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.ppc.rpm SHA-256: bb55c8bd1765c2e294eb846482d4f407674ae03f2db5944c938059122cb8a3e6
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.ppc64.rpm SHA-256: 00c60a3d567f7b10e61970bca34df7f3e94778af3f12c5434430491ec18040ce
nss-tools-3.12.3.99.3-1.el5_3.2.ppc.rpm SHA-256: 261281f38ead671252e70c09c2d04260778a970bec8e15fa2446ea854cd631fb

Red Hat Enterprise Linux Server from RHUI 5

SRPM
nspr-4.7.4-1.el5_3.1.src.rpm SHA-256: e4465bef98a7c6958ee83de53d6c3bbb7311f77b56381862cdfc8a8d54f8042f
nss-3.12.3.99.3-1.el5_3.2.src.rpm SHA-256: eb6babde78d23e4c86d6636ecbf8a26b6fa860e435b90ee99ef1ad426ca86736
x86_64
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: f3dd78904ca9ec4872e22222cf81493528a4ea4e7c7cb8c52d9321b3043d839e
nspr-devel-4.7.4-1.el5_3.1.i386.rpm SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce
nspr-devel-4.7.4-1.el5_3.1.x86_64.rpm SHA-256: b1c1dcc6c66fc1991eaa8dc13754e04abf49774e1ae7ce6fa678e24f8dd71e66
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: a81458335daa252834cd6f894aa859c7e191baed2fffbd0056f62ac5c40d25a7
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152
nss-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 8e046294dd6a7af3b3687ba7a21782b1b3b9aae38e4d5a68887db399d30b2b62
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 11458dd8499cf64b6ab11f506ee98a7d968c57cb9bf85c2d641bf292e12f64b4
nss-tools-3.12.3.99.3-1.el5_3.2.x86_64.rpm SHA-256: 119a9c5239f5d5fd377016705ef00cc191bd4149b57ebfc6b57eb01f879b5016
i386
nspr-4.7.4-1.el5_3.1.i386.rpm SHA-256: 43033016b61c343b5a10df074c6c19e7232314967c149c8a5e4f675b0aa1a09b
nspr-devel-4.7.4-1.el5_3.1.i386.rpm SHA-256: 47a61d7aa57a53e78fb6d99f64a455010cd9eb51a89534a05cd9d233b2ff46ce
nss-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 1ec0d6d032c84f262371e307e30c9c1a6ab7fd3ec0ec1e144a6300ab1b4f6510
nss-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 2015ac59c7d247656b73f26f0fe707cae846d0bcb9dc494d18d1f5c6bd447152
nss-pkcs11-devel-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 9f00bea5f4da6c0409b62d001bb98fd9717aa7e4be35812c83a1c1ef82a4a4e5
nss-tools-3.12.3.99.3-1.el5_3.2.i386.rpm SHA-256: 8a6e3673f1e74658939c3cbced97344975f03a91ac1ecc0fefb2260f3345c62a

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3

SRPM
ppc

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter