Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:1791 - Security Advisory
Issued:
2013-12-05
Updated:
2013-12-05

RHSA-2013:1791 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: nss and nspr security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated nss and nspr packages that fix multiple security issues, several
bugs, and add various enhancements are now available for Red Hat Enterprise
Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

Network Security Services (NSS) is a set of libraries designed to support
the cross-platform development of security-enabled client and server
applications. Netscape Portable Runtime (NSPR) provides platform
independence for non-GUI operating system facilities.

A flaw was found in the way NSS handled invalid handshake packets. A remote
attacker could use this flaw to cause a TLS/SSL client using NSS to crash
or, possibly, execute arbitrary code with the privileges of the user
running the application. (CVE-2013-5605)

It was found that the fix for CVE-2013-1620 released via RHSA-2013:1135
introduced a regression causing NSS to read uninitialized data when a
decryption failure occurred. A remote attacker could use this flaw to cause
a TLS/SSL server using NSS to crash. (CVE-2013-1739)

An integer overflow flaw was discovered in both NSS and NSPR's
implementation of certification parsing on 64-bit systems. A remote
attacker could use these flaws to cause an application using NSS or NSPR to
crash. (CVE-2013-1741, CVE-2013-5607)

It was discovered that NSS did not reject certificates with incompatible
key usage constraints when validating them while the verifyLog feature was
enabled. An application using the NSS certificate validation API could
accept an invalid certificate. (CVE-2013-5606)

Red Hat would like to thank the Mozilla project for reporting
CVE-2013-1741, CVE-2013-5606, and CVE-2013-5607. Upstream acknowledges
Tavis Ormandy as the original reporter of CVE-2013-1741, Camilo Viecco as
the original reporter of CVE-2013-5606, and Pascal Cuoq, Kamil Dudka, and
Wan-Teh Chang as the original reporters of CVE-2013-5607.

In addition, the nss package has been upgraded to upstream version 3.15.3,
and the nspr package has been upgraded to upstream version 4.10.2.
These updates provide a number of bug fixes and enhancements over the
previous versions. (BZ#1033478, BZ#1020520)

This update also fixes the following bug:

  • The RHBA-2013:1318 update introduced a regression that prevented the use

of certificates that have an MD5 signature. This update fixes this
regression and certificates that have an MD5 signature are once again
supported. To prevent the use of certificates that have an MD5 signature,
set the "NSS_HASH_ALG_SUPPORT" environment variable to "-MD5". (BZ#1033499)

Users of NSS and NSPR are advised to upgrade to these updated packages,
which fix these issues and add these enhancements. After installing this
update, applications using NSS or NSPR must be restarted for this update to
take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1012740 - CVE-2013-1739 nss: Avoid uninitialized data read in the event of a decryption failure
  • BZ - 1030807 - CVE-2013-5605 nss: Null_Cipher() does not respect maxOutputLen (MFSA 2013-103)
  • BZ - 1031457 - CVE-2013-5606 nss: CERT_VerifyCert returns SECSuccess (saying certificate is good) even for bad certificates (MFSA 2013-103)
  • BZ - 1031458 - CVE-2013-1741 nss: Integer truncation in certificate parsing (MFSA 2013-103)
  • BZ - 1031461 - CVE-2013-5607 nspr: Avoid unsigned integer wrapping in PL_ArenaAllocate (MFSA 2013-103)

CVEs

  • CVE-2013-1739
  • CVE-2013-5606
  • CVE-2013-5607
  • CVE-2013-1741
  • CVE-2013-5605

References

  • https://access.redhat.com/security/updates/classification/#important
  • http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
nspr-4.10.2-2.el5_10.src.rpm SHA-256: fcbbd12d49123657ce79eed12cb5a92bcf1ae24a71ad4d2a844c39d564ad148c
nss-3.15.3-3.el5_10.src.rpm SHA-256: 4d06c4c92bb643866fb2f7d745d0f640c9a5fcd6d636e68487b0181c880bc24f
x86_64
nspr-4.10.2-2.el5_10.i386.rpm SHA-256: d49fa42be509b5cd97176595995bb9f870912fbe99717cba5a0a701febced5a9
nspr-4.10.2-2.el5_10.x86_64.rpm SHA-256: e0ee88e84ada439facbecacfff56d533b8f8c9d2e4b328259d2c205d5118e768
nspr-debuginfo-4.10.2-2.el5_10.i386.rpm SHA-256: 5d938e9aa0713b7b8cdbb4c879522cc9d78186ac99ef1c1e42d5592f8862573e
nspr-debuginfo-4.10.2-2.el5_10.x86_64.rpm SHA-256: 867dacc9c294393c92b46afd046bc22a7c9574781182a4e3994414bbef482d82
nspr-devel-4.10.2-2.el5_10.i386.rpm SHA-256: c6f91202a0add3d726b4b0372b7fecfc2cd3684b64cbad49c9ab04c250d28a3f
nspr-devel-4.10.2-2.el5_10.x86_64.rpm SHA-256: 15ff51f94fea5d986f4d8dee3b4f7ffc274ac4f1a3a0ff4c8c9e5a4965159319
nss-3.15.3-3.el5_10.i386.rpm SHA-256: c3e7c2ae02dd3c15688b011c6d0a726244a8b538ec9c9fd2e0a297442017f897
nss-3.15.3-3.el5_10.x86_64.rpm SHA-256: 8b2c0104929c31e599aa6e88c49a9ecc9d420dbbfd0ca99705af6cd824ab82ed
nss-debuginfo-3.15.3-3.el5_10.i386.rpm SHA-256: ab755e2a36d87f5250ac5a14021136fcb6b2b227a31904cd7bffc4b79211598e
nss-debuginfo-3.15.3-3.el5_10.x86_64.rpm SHA-256: f4199f68c02b9f72c403070037c22c52c6a66426d5acf679c2b6b41817910cc1
nss-devel-3.15.3-3.el5_10.i386.rpm SHA-256: 5db6988113f9b5bbf1ea60cef18c147143053ff3dce36566d756f11ae5436be5
nss-devel-3.15.3-3.el5_10.x86_64.rpm SHA-256: 62c2c49bbddecaf5e89234a982f0c5026daa0b7f9991170056b532005c4defe7
nss-pkcs11-devel-3.15.3-3.el5_10.i386.rpm SHA-256: 030bb74aade851e41a228c2e12d253c7fcb86996c3e62a98d4f38038b1ce11dc
nss-pkcs11-devel-3.15.3-3.el5_10.x86_64.rpm SHA-256: 7094b16a97e21ba007c844f7c7d8edbc1637d2fad27249e87c99193ff543d4ac
nss-tools-3.15.3-3.el5_10.x86_64.rpm SHA-256: 7fe1a75cda60f63e6710aac4f69d3e29ecc7986d05c91d670c96e9f640864555
ia64
nspr-4.10.2-2.el5_10.i386.rpm SHA-256: d49fa42be509b5cd97176595995bb9f870912fbe99717cba5a0a701febced5a9
nspr-4.10.2-2.el5_10.ia64.rpm SHA-256: 76d41dad7983a51e0afc13586087eb564dba05779478dcc6d1685cb0237e970f
nspr-debuginfo-4.10.2-2.el5_10.i386.rpm SHA-256: 5d938e9aa0713b7b8cdbb4c879522cc9d78186ac99ef1c1e42d5592f8862573e
nspr-debuginfo-4.10.2-2.el5_10.ia64.rpm SHA-256: f4ab6e3e4bf673ac27986eb33ba0b4c18373f8cd5db956cba1d30e5701281b3c
nspr-devel-4.10.2-2.el5_10.ia64.rpm SHA-256: 3b61990d19a827e51cc3dc85febff612623dbc84f5523a009d28c671673f9dbb
nss-3.15.3-3.el5_10.i386.rpm SHA-256: c3e7c2ae02dd3c15688b011c6d0a726244a8b538ec9c9fd2e0a297442017f897
nss-3.15.3-3.el5_10.ia64.rpm SHA-256: ed04d40c740c935eb5d5032d28bbee343e0af8c3fd0c48cd439491ccfe3b357a
nss-debuginfo-3.15.3-3.el5_10.i386.rpm SHA-256: ab755e2a36d87f5250ac5a14021136fcb6b2b227a31904cd7bffc4b79211598e
nss-debuginfo-3.15.3-3.el5_10.ia64.rpm SHA-256: 14b5a3bb76129de544dda260a232394b1cf0d3fbdd6c8b0079206c1f0ec6227a
nss-devel-3.15.3-3.el5_10.ia64.rpm SHA-256: 914514b77e031ab2e6fc7a2c870500ee079d682d0472392f8f98243e04149e1d
nss-pkcs11-devel-3.15.3-3.el5_10.ia64.rpm SHA-256: b87c4aa178e55f882a04b007d4077daf832649803ddda5119113b1629f1a35b9
nss-tools-3.15.3-3.el5_10.ia64.rpm SHA-256: 53268f8a3bad6c343414e6316c32fb4333615313f194173b9b3600a2dab988d7
i386
nspr-4.10.2-2.el5_10.i386.rpm SHA-256: d49fa42be509b5cd97176595995bb9f870912fbe99717cba5a0a701febced5a9
nspr-debuginfo-4.10.2-2.el5_10.i386.rpm SHA-256: 5d938e9aa0713b7b8cdbb4c879522cc9d78186ac99ef1c1e42d5592f8862573e
nspr-devel-4.10.2-2.el5_10.i386.rpm SHA-256: c6f91202a0add3d726b4b0372b7fecfc2cd3684b64cbad49c9ab04c250d28a3f
nss-3.15.3-3.el5_10.i386.rpm SHA-256: c3e7c2ae02dd3c15688b011c6d0a726244a8b538ec9c9fd2e0a297442017f897
nss-debuginfo-3.15.3-3.el5_10.i386.rpm SHA-256: ab755e2a36d87f5250ac5a14021136fcb6b2b227a31904cd7bffc4b79211598e
nss-devel-3.15.3-3.el5_10.i386.rpm SHA-256: 5db6988113f9b5bbf1ea60cef18c147143053ff3dce36566d756f11ae5436be5
nss-pkcs11-devel-3.15.3-3.el5_10.i386.rpm SHA-256: 030bb74aade851e41a228c2e12d253c7fcb86996c3e62a98d4f38038b1ce11dc
nss-tools-3.15.3-3.el5_10.i386.rpm SHA-256: ddaaa72b447d4a10c65af33542b066eb98a131a0955ed5fc3514397e438eac80

Red Hat Enterprise Linux Workstation 5

SRPM
nspr-4.10.2-2.el5_10.src.rpm SHA-256: fcbbd12d49123657ce79eed12cb5a92bcf1ae24a71ad4d2a844c39d564ad148c
nss-3.15.3-3.el5_10.src.rpm SHA-256: 4d06c4c92bb643866fb2f7d745d0f640c9a5fcd6d636e68487b0181c880bc24f
x86_64
nspr-4.10.2-2.el5_10.i386.rpm SHA-256: d49fa42be509b5cd97176595995bb9f870912fbe99717cba5a0a701febced5a9
nspr-4.10.2-2.el5_10.x86_64.rpm SHA-256: e0ee88e84ada439facbecacfff56d533b8f8c9d2e4b328259d2c205d5118e768
nspr-debuginfo-4.10.2-2.el5_10.i386.rpm SHA-256: 5d938e9aa0713b7b8cdbb4c879522cc9d78186ac99ef1c1e42d5592f8862573e
nspr-debuginfo-4.10.2-2.el5_10.i386.rpm SHA-256: 5d938e9aa0713b7b8cdbb4c879522cc9d78186ac99ef1c1e42d5592f8862573e
nspr-debuginfo-4.10.2-2.el5_10.x86_64.rpm SHA-256: 867dacc9c294393c92b46afd046bc22a7c9574781182a4e3994414bbef482d82
nspr-debuginfo-4.10.2-2.el5_10.x86_64.rpm SHA-256: 867dacc9c294393c92b46afd046bc22a7c9574781182a4e3994414bbef482d82
nspr-devel-4.10.2-2.el5_10.i386.rpm SHA-256: c6f91202a0add3d726b4b0372b7fecfc2cd3684b64cbad49c9ab04c250d28a3f
nspr-devel-4.10.2-2.el5_10.x86_64.rpm SHA-256: 15ff51f94fea5d986f4d8dee3b4f7ffc274ac4f1a3a0ff4c8c9e5a4965159319
nss-3.15.3-3.el5_10.i386.rpm SHA-256: c3e7c2ae02dd3c15688b011c6d0a726244a8b538ec9c9fd2e0a297442017f897
nss-3.15.3-3.el5_10.x86_64.rpm SHA-256: 8b2c0104929c31e599aa6e88c49a9ecc9d420dbbfd0ca99705af6cd824ab82ed
nss-debuginfo-3.15.3-3.el5_10.i386.rpm SHA-256: ab755e2a36d87f5250ac5a14021136fcb6b2b227a31904cd7bffc4b79211598e
nss-debuginfo-3.15.3-3.el5_10.i386.rpm SHA-256: ab755e2a36d87f5250ac5a14021136fcb6b2b227a31904cd7bffc4b79211598e
nss-debuginfo-3.15.3-3.el5_10.x86_64.rpm SHA-256: f4199f68c02b9f72c403070037c22c52c6a66426d5acf679c2b6b41817910cc1
nss-debuginfo-3.15.3-3.el5_10.x86_64.rpm SHA-256: f4199f68c02b9f72c403070037c22c52c6a66426d5acf679c2b6b41817910cc1
nss-devel-3.15.3-3.el5_10.i386.rpm SHA-256: 5db6988113f9b5bbf1ea60cef18c147143053ff3dce36566d756f11ae5436be5
nss-devel-3.15.3-3.el5_10.x86_64.rpm SHA-256: 62c2c49bbddecaf5e89234a982f0c5026daa0b7f9991170056b532005c4defe7
nss-pkcs11-devel-3.15.3-3.el5_10.i386.rpm SHA-256: 030bb74aade851e41a228c2e12d253c7fcb86996c3e62a98d4f38038b1ce11dc
nss-pkcs11-devel-3.15.3-3.el5_10.x86_64.rpm SHA-256: 7094b16a97e21ba007c844f7c7d8edbc1637d2fad27249e87c99193ff543d4ac
nss-tools-3.15.3-3.el5_10.x86_64.rpm SHA-256: 7fe1a75cda60f63e6710aac4f69d3e29ecc7986d05c91d670c96e9f640864555
i386
nspr-4.10.2-2.el5_10.i386.rpm SHA-256: d49fa42be509b5cd97176595995bb9f870912fbe99717cba5a0a701febced5a9
nspr-debuginfo-4.10.2-2.el5_10.i386.rpm SHA-256: 5d938e9aa0713b7b8cdbb4c879522cc9d78186ac99ef1c1e42d5592f8862573e
nspr-debuginfo-4.10.2-2.el5_10.i386.rpm SHA-256: 5d938e9aa0713b7b8cdbb4c879522cc9d78186ac99ef1c1e42d5592f8862573e
nspr-devel-4.10.2-2.el5_10.i386.rpm SHA-256: c6f91202a0add3d726b4b0372b7fecfc2cd3684b64cbad49c9ab04c250d28a3f
nss-3.15.3-3.el5_10.i386.rpm SHA-256: c3e7c2ae02dd3c15688b011c6d0a726244a8b538ec9c9fd2e0a297442017f897
nss-debuginfo-3.15.3-3.el5_10.i386.rpm SHA-256: ab755e2a36d87f5250ac5a14021136fcb6b2b227a31904cd7bffc4b79211598e
nss-debuginfo-3.15.3-3.el5_10.i386.rpm SHA-256: ab755e2a36d87f5250ac5a14021136fcb6b2b227a31904cd7bffc4b79211598e
nss-devel-3.15.3-3.el5_10.i386.rpm SHA-256: 5db6988113f9b5bbf1ea60cef18c147143053ff3dce36566d756f11ae5436be5
nss-pkcs11-devel-3.15.3-3.el5_10.i386.rpm SHA-256: 030bb74aade851e41a228c2e12d253c7fcb86996c3e62a98d4f38038b1ce11dc
nss-tools-3.15.3-3.el5_10.i386.rpm SHA-256: ddaaa72b447d4a10c65af33542b066eb98a131a0955ed5fc3514397e438eac80

Red Hat Enterprise Linux Desktop 5

SRPM
nspr-4.10.2-2.el5_10.src.rpm SHA-256: fcbbd12d49123657ce79eed12cb5a92bcf1ae24a71ad4d2a844c39d564ad148c
nss-3.15.3-3.el5_10.src.rpm SHA-256: 4d06c4c92bb643866fb2f7d745d0f640c9a5fcd6d636e68487b0181c880bc24f
x86_64
nspr-4.10.2-2.el5_10.i386.rpm SHA-256: d49fa42be509b5cd97176595995bb9f870912fbe99717cba5a0a701febced5a9
nspr-4.10.2-2.el5_10.x86_64.rpm SHA-256: e0ee88e84ada439facbecacfff56d533b8f8c9d2e4b328259d2c205d5118e768
nspr-debuginfo-4.10.2-2.el5_10.i386.rpm SHA-256: 5d938e9aa0713b7b8cdbb4c879522cc9d78186ac99ef1c1e42d5592f8862573e
nspr-debuginfo-4.10.2-2.el5_10.x86_64.rpm SHA-256: 867dacc9c294393c92b46afd046bc22a7c9574781182a4e3994414bbef482d82
nss-3.15.3-3.el5_10.i386.rpm SHA-256: c3e7c2ae02dd3c15688b011c6d0a726244a8b538ec9c9fd2e0a297442017f897
nss-3.15.3-3.el5_10.x86_64.rpm SHA-256: 8b2c0104929c31e599aa6e88c49a9ecc9d420dbbfd0ca99705af6cd824ab82ed
nss-debuginfo-3.15.3-3.el5_10.i386.rpm SHA-256: ab755e2a36d87f5250ac5a14021136fcb6b2b227a31904cd7bffc4b79211598e
nss-debuginfo-3.15.3-3.el5_10.x86_64.rpm SHA-256: f4199f68c02b9f72c403070037c22c52c6a66426d5acf679c2b6b41817910cc1
nss-tools-3.15.3-3.el5_10.x86_64.rpm SHA-256: 7fe1a75cda60f63e6710aac4f69d3e29ecc7986d05c91d670c96e9f640864555
i386
nspr-4.10.2-2.el5_10.i386.rpm SHA-256: d49fa42be509b5cd97176595995bb9f870912fbe99717cba5a0a701febced5a9
nspr-debuginfo-4.10.2-2.el5_10.i386.rpm SHA-256: 5d938e9aa0713b7b8cdbb4c879522cc9d78186ac99ef1c1e42d5592f8862573e
nss-3.15.3-3.el5_10.i386.rpm SHA-256: c3e7c2ae02dd3c15688b011c6d0a726244a8b538ec9c9fd2e0a297442017f897
nss-debuginfo-3.15.3-3.el5_10.i386.rpm SHA-256: ab755e2a36d87f5250ac5a14021136fcb6b2b227a31904cd7bffc4b79211598e
nss-tools-3.15.3-3.el5_10.i386.rpm SHA-256: ddaaa72b447d4a10c65af33542b066eb98a131a0955ed5fc3514397e438eac80

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
nspr-4.10.2-2.el5_10.src.rpm SHA-256: fcbbd12d49123657ce79eed12cb5a92bcf1ae24a71ad4d2a844c39d564ad148c
nss-3.15.3-3.el5_10.src.rpm SHA-256: 4d06c4c92bb643866fb2f7d745d0f640c9a5fcd6d636e68487b0181c880bc24f
s390x
nspr-4.10.2-2.el5_10.s390.rpm SHA-256: 3b7f46554f7a9ceba6bbc91aebf74ddf0d47ddc5af0dfae79edadb029652c5ac
nspr-4.10.2-2.el5_10.s390x.rpm SHA-256: feaa346091fc959c2f261cf8689eff9d01139dfad71cbaed4b8eaa13e0a1f905
nspr-debuginfo-4.10.2-2.el5_10.s390.rpm SHA-256: 3bd8c26ccb49cfb3830a62cb2365ccc79e420527addec8008bb95f245184545e
nspr-debuginfo-4.10.2-2.el5_10.s390x.rpm SHA-256: 0d460996ba755673a35443f90cd2d3f474630c61ac0fec9ecac885a73de281e1
nspr-devel-4.10.2-2.el5_10.s390.rpm SHA-256: ba853e5172c9cc06a5e51f3438ae3e144a421a4a83f791ad0b97165e325cf61c
nspr-devel-4.10.2-2.el5_10.s390x.rpm SHA-256: 02231d19ffd8f86f7dd82f57232a9fe3a34f9ebb64968d49c4d79bab4de38bc1
nss-3.15.3-3.el5_10.s390.rpm SHA-256: 60112225febb99aa57a884c6c5b001db138d05deed71e6c17faae02159867659
nss-3.15.3-3.el5_10.s390x.rpm SHA-256: 119d50371853b252d0a478bd740c168f3c24f1b48ed2d7f842fa28db6a5bc7af
nss-debuginfo-3.15.3-3.el5_10.s390.rpm SHA-256: 8b903a61b8137bd92f78f3d8f08127b7f6cec02c9da7c0a634e7cb52c82855fb
nss-debuginfo-3.15.3-3.el5_10.s390x.rpm SHA-256: e210dcfe40acc9077e3c7f407bae8a18152e197d1d06ea9a1890916bf7eacdca
nss-devel-3.15.3-3.el5_10.s390.rpm SHA-256: 162706d560512154980aa4e4f0b5f99ab3747a9eb8759b8191565758cb75ead2
nss-devel-3.15.3-3.el5_10.s390x.rpm SHA-256: 8da059a38e7b6dce93bf3f35471b38cfc41f99b933c13773a76b1a339b97cc59
nss-pkcs11-devel-3.15.3-3.el5_10.s390.rpm SHA-256: cf9a9ba72855e19e24ca6e2fa8f98c46ea2efa97044f3a78692b4464e7b944aa
nss-pkcs11-devel-3.15.3-3.el5_10.s390x.rpm SHA-256: a15a9e5d3b1da54345d4dc01a551af1e4e3f08fcd6cd162bc960ce4bee9d2101
nss-tools-3.15.3-3.el5_10.s390x.rpm SHA-256: 27ac145a0fc4249f1b576c2d60c16a04febb96f128835d00934ce00e1360f7ca

Red Hat Enterprise Linux for Power, big endian 5

SRPM
nspr-4.10.2-2.el5_10.src.rpm SHA-256: fcbbd12d49123657ce79eed12cb5a92bcf1ae24a71ad4d2a844c39d564ad148c
nss-3.15.3-3.el5_10.src.rpm SHA-256: 4d06c4c92bb643866fb2f7d745d0f640c9a5fcd6d636e68487b0181c880bc24f
ppc
nspr-4.10.2-2.el5_10.ppc.rpm SHA-256: f8086c54bdcc1de4dbaafe8d8c206e387915b354b693d5d831b9b414cafa54e0
nspr-4.10.2-2.el5_10.ppc64.rpm SHA-256: 97241f215d12325faa0b44069f466a2b099eb9a049c4cec4541cbd088e0d0803
nspr-debuginfo-4.10.2-2.el5_10.ppc.rpm SHA-256: 4912de0633943e7ae83e427b18448bdbeb9f96ebe635dc7de2c85b7dafe1af5d
nspr-debuginfo-4.10.2-2.el5_10.ppc64.rpm SHA-256: 97d26ae6da894c109fe581c2198dea11cab1a04a6513823f688388b04605f256
nspr-devel-4.10.2-2.el5_10.ppc.rpm SHA-256: 6517141d037b1399418b9079562b2062717e6006c90a0b81f7e05409fce6b9bf
nspr-devel-4.10.2-2.el5_10.ppc64.rpm SHA-256: 746f17513ed085cf00a0f336983496b895cd7591dbb246420d8f477240868e96
nss-3.15.3-3.el5_10.ppc.rpm SHA-256: 89c7dc03cf3de630601122ed5e203db336b88b8d60b4ebc30da0d15ea0b547d1
nss-3.15.3-3.el5_10.ppc64.rpm SHA-256: 34033f113f4f13af706edd273ccc9e205d33753ab0af6e1920c5b9dc460b8f66
nss-debuginfo-3.15.3-3.el5_10.ppc.rpm SHA-256: 8e9bf9f0519fea294a034aa5cd7e36d6b3330f2365d1935831dff3d749c56b42
nss-debuginfo-3.15.3-3.el5_10.ppc64.rpm SHA-256: 121dd336702420550c80992ee5acd81a722fda06130f5db3636d8ed6a32c8252
nss-devel-3.15.3-3.el5_10.ppc.rpm SHA-256: a31a6131a4b7688e8f17d338e1a8dcc6f5f61a637105fa97f3e52d0287c3503c
nss-devel-3.15.3-3.el5_10.ppc64.rpm SHA-256: 157e9eb24efdd5e6e9be3fb5b7db0fbf2972934a32cd99ce3b95b76f8280864f
nss-pkcs11-devel-3.15.3-3.el5_10.ppc.rpm SHA-256: 0f1489cfdc48d7afcf390a93e013c97250669a0b12a934f896d7b02c4aa6b852
nss-pkcs11-devel-3.15.3-3.el5_10.ppc64.rpm SHA-256: 290dd9077212a1266cfb39249b12da302aec37a7b3af53bf588491ae8acc1e39
nss-tools-3.15.3-3.el5_10.ppc.rpm SHA-256: ef3c948ce39fe8159a31456d0188c8c222f0195f06d70f1ae07124e35aba060d

Red Hat Enterprise Linux Server from RHUI 5

SRPM
nspr-4.10.2-2.el5_10.src.rpm SHA-256: fcbbd12d49123657ce79eed12cb5a92bcf1ae24a71ad4d2a844c39d564ad148c
nss-3.15.3-3.el5_10.src.rpm SHA-256: 4d06c4c92bb643866fb2f7d745d0f640c9a5fcd6d636e68487b0181c880bc24f
x86_64
nspr-4.10.2-2.el5_10.i386.rpm SHA-256: d49fa42be509b5cd97176595995bb9f870912fbe99717cba5a0a701febced5a9
nspr-4.10.2-2.el5_10.x86_64.rpm SHA-256: e0ee88e84ada439facbecacfff56d533b8f8c9d2e4b328259d2c205d5118e768
nspr-debuginfo-4.10.2-2.el5_10.i386.rpm SHA-256: 5d938e9aa0713b7b8cdbb4c879522cc9d78186ac99ef1c1e42d5592f8862573e
nspr-debuginfo-4.10.2-2.el5_10.x86_64.rpm SHA-256: 867dacc9c294393c92b46afd046bc22a7c9574781182a4e3994414bbef482d82
nspr-devel-4.10.2-2.el5_10.i386.rpm SHA-256: c6f91202a0add3d726b4b0372b7fecfc2cd3684b64cbad49c9ab04c250d28a3f
nspr-devel-4.10.2-2.el5_10.x86_64.rpm SHA-256: 15ff51f94fea5d986f4d8dee3b4f7ffc274ac4f1a3a0ff4c8c9e5a4965159319
nss-3.15.3-3.el5_10.i386.rpm SHA-256: c3e7c2ae02dd3c15688b011c6d0a726244a8b538ec9c9fd2e0a297442017f897
nss-3.15.3-3.el5_10.x86_64.rpm SHA-256: 8b2c0104929c31e599aa6e88c49a9ecc9d420dbbfd0ca99705af6cd824ab82ed
nss-debuginfo-3.15.3-3.el5_10.i386.rpm SHA-256: ab755e2a36d87f5250ac5a14021136fcb6b2b227a31904cd7bffc4b79211598e
nss-debuginfo-3.15.3-3.el5_10.x86_64.rpm SHA-256: f4199f68c02b9f72c403070037c22c52c6a66426d5acf679c2b6b41817910cc1
nss-devel-3.15.3-3.el5_10.i386.rpm SHA-256: 5db6988113f9b5bbf1ea60cef18c147143053ff3dce36566d756f11ae5436be5
nss-devel-3.15.3-3.el5_10.x86_64.rpm SHA-256: 62c2c49bbddecaf5e89234a982f0c5026daa0b7f9991170056b532005c4defe7
nss-pkcs11-devel-3.15.3-3.el5_10.i386.rpm SHA-256: 030bb74aade851e41a228c2e12d253c7fcb86996c3e62a98d4f38038b1ce11dc
nss-pkcs11-devel-3.15.3-3.el5_10.x86_64.rpm SHA-256: 7094b16a97e21ba007c844f7c7d8edbc1637d2fad27249e87c99193ff543d4ac
nss-tools-3.15.3-3.el5_10.x86_64.rpm SHA-256: 7fe1a75cda60f63e6710aac4f69d3e29ecc7986d05c91d670c96e9f640864555
i386
nspr-4.10.2-2.el5_10.i386.rpm SHA-256: d49fa42be509b5cd97176595995bb9f870912fbe99717cba5a0a701febced5a9
nspr-debuginfo-4.10.2-2.el5_10.i386.rpm SHA-256: 5d938e9aa0713b7b8cdbb4c879522cc9d78186ac99ef1c1e42d5592f8862573e
nspr-devel-4.10.2-2.el5_10.i386.rpm SHA-256: c6f91202a0add3d726b4b0372b7fecfc2cd3684b64cbad49c9ab04c250d28a3f
nss-3.15.3-3.el5_10.i386.rpm SHA-256: c3e7c2ae02dd3c15688b011c6d0a726244a8b538ec9c9fd2e0a297442017f897
nss-debuginfo-3.15.3-3.el5_10.i386.rpm SHA-256: ab755e2a36d87f5250ac5a14021136fcb6b2b227a31904cd7bffc4b79211598e
nss-devel-3.15.3-3.el5_10.i386.rpm SHA-256: 5db6988113f9b5bbf1ea60cef18c147143053ff3dce36566d756f11ae5436be5
nss-pkcs11-devel-3.15.3-3.el5_10.i386.rpm SHA-256: 030bb74aade851e41a228c2e12d253c7fcb86996c3e62a98d4f38038b1ce11dc
nss-tools-3.15.3-3.el5_10.i386.rpm SHA-256: ddaaa72b447d4a10c65af33542b066eb98a131a0955ed5fc3514397e438eac80

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility