Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:0371 - Security Advisory
Issued:
2016-03-09
Updated:
2016-03-09

RHSA-2016:0371 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: nss security update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated nss packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

Network Security Services (NSS) is a set of libraries designed to support
the cross-platform development of security-enabled client and server
applications.

A heap-based buffer overflow flaw was found in the way NSS parsed certain
ASN.1 structures. An attacker could use this flaw to create a specially
crafted certificate which, when parsed by NSS, could cause it to crash, or
execute arbitrary code, using the permissions of the user running an
application compiled against the NSS library. (CVE-2016-1950)

Red Hat would like to thank the Mozilla project for reporting this issue.
Upstream acknowledges Francis Gabriel as the original reporter.

All nss users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. For the update to take
effect, all applications linked to the nss library must be restarted, or
the system rebooted.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1310509 - CVE-2016-1950 nss: Heap buffer overflow vulnerability in ASN1 certificate parsing (MFSA 2016-35)

CVEs

  • CVE-2016-1950

References

  • https://access.redhat.com/security/updates/classification/#critical
  • https://www.mozilla.org/en-US/security/advisories/mfsa2016-36
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
nss-3.19.1-4.el5_11.src.rpm SHA-256: e2ed10921358fe438dc597b79575e0288375277682c1f794f616d118703cec72
x86_64
nss-3.19.1-4.el5_11.i386.rpm SHA-256: 450dd70148a25759d516bb7f9ee6864a8038221cd23cffa78dd4c97a6fcaf5b2
nss-3.19.1-4.el5_11.x86_64.rpm SHA-256: 943076eece09883a2319211f72064bb9cbd3ca45ee8f0d754a58e0a91e38ea8b
nss-debuginfo-3.19.1-4.el5_11.i386.rpm SHA-256: e1dca4fae0064ec73069503185f570703b50abe5d1186e83465d84fbc0ad01dd
nss-debuginfo-3.19.1-4.el5_11.x86_64.rpm SHA-256: 72a6d9440442e9e6765d9f22877b72a83bfa00dcfe9a704b50e565f69795d1d3
nss-devel-3.19.1-4.el5_11.i386.rpm SHA-256: 7d77d7819b16fc71965ed86ca7e10f6be48c5997a13512fb8d77f56d3bf13b74
nss-devel-3.19.1-4.el5_11.x86_64.rpm SHA-256: 65ddd0935783f0ac00c61fd3e13d7fb6509f01d3afa423c7dbfdb4c3aabc4281
nss-pkcs11-devel-3.19.1-4.el5_11.i386.rpm SHA-256: 333a39e4714a367ac8f46a26c3adb6981b8e54b09b4a241c43a84c0a2a8195fd
nss-pkcs11-devel-3.19.1-4.el5_11.x86_64.rpm SHA-256: fb02c20684a651c675e5b81fcba40487e1c8e6cfdcb90d261888347980b9bef9
nss-tools-3.19.1-4.el5_11.x86_64.rpm SHA-256: 8076efffecd7eb91da1bb1115921bfd4b250e599597c1daeb920a9e620fa7550
ia64
nss-3.19.1-4.el5_11.i386.rpm SHA-256: 450dd70148a25759d516bb7f9ee6864a8038221cd23cffa78dd4c97a6fcaf5b2
nss-3.19.1-4.el5_11.ia64.rpm SHA-256: 27ea8e9c557bd3ec8ee5c1f44c9c73a44e55887d83216f6b529c6cb78c95fdd7
nss-debuginfo-3.19.1-4.el5_11.i386.rpm SHA-256: e1dca4fae0064ec73069503185f570703b50abe5d1186e83465d84fbc0ad01dd
nss-debuginfo-3.19.1-4.el5_11.ia64.rpm SHA-256: 192132ea5cc4e1ba95fdd88208fbf20b0f9b55bbbfe86e749f060a9c30b83c3f
nss-devel-3.19.1-4.el5_11.ia64.rpm SHA-256: 6a9a2d5772f1ed63cbd4c26a5614ece8fe687840ca3da17d1fb114864085852c
nss-pkcs11-devel-3.19.1-4.el5_11.ia64.rpm SHA-256: 47c9c10468f87486ecda09fde342a1a5279d2fddc83d20fb090ac8bfa73c82a6
nss-tools-3.19.1-4.el5_11.ia64.rpm SHA-256: 501dba43ca3c730875eb36dfaadebed45504d76fd1a7ca08b7f8a52127d2c097
i386
nss-3.19.1-4.el5_11.i386.rpm SHA-256: 450dd70148a25759d516bb7f9ee6864a8038221cd23cffa78dd4c97a6fcaf5b2
nss-debuginfo-3.19.1-4.el5_11.i386.rpm SHA-256: e1dca4fae0064ec73069503185f570703b50abe5d1186e83465d84fbc0ad01dd
nss-devel-3.19.1-4.el5_11.i386.rpm SHA-256: 7d77d7819b16fc71965ed86ca7e10f6be48c5997a13512fb8d77f56d3bf13b74
nss-pkcs11-devel-3.19.1-4.el5_11.i386.rpm SHA-256: 333a39e4714a367ac8f46a26c3adb6981b8e54b09b4a241c43a84c0a2a8195fd
nss-tools-3.19.1-4.el5_11.i386.rpm SHA-256: 8fe0677dc573438c67b08a066581839480190c417fd42f45b426bf9a35a27693

Red Hat Enterprise Linux Workstation 5

SRPM
nss-3.19.1-4.el5_11.src.rpm SHA-256: e2ed10921358fe438dc597b79575e0288375277682c1f794f616d118703cec72
x86_64
nss-3.19.1-4.el5_11.i386.rpm SHA-256: 450dd70148a25759d516bb7f9ee6864a8038221cd23cffa78dd4c97a6fcaf5b2
nss-3.19.1-4.el5_11.x86_64.rpm SHA-256: 943076eece09883a2319211f72064bb9cbd3ca45ee8f0d754a58e0a91e38ea8b
nss-debuginfo-3.19.1-4.el5_11.i386.rpm SHA-256: e1dca4fae0064ec73069503185f570703b50abe5d1186e83465d84fbc0ad01dd
nss-debuginfo-3.19.1-4.el5_11.i386.rpm SHA-256: e1dca4fae0064ec73069503185f570703b50abe5d1186e83465d84fbc0ad01dd
nss-debuginfo-3.19.1-4.el5_11.x86_64.rpm SHA-256: 72a6d9440442e9e6765d9f22877b72a83bfa00dcfe9a704b50e565f69795d1d3
nss-debuginfo-3.19.1-4.el5_11.x86_64.rpm SHA-256: 72a6d9440442e9e6765d9f22877b72a83bfa00dcfe9a704b50e565f69795d1d3
nss-devel-3.19.1-4.el5_11.i386.rpm SHA-256: 7d77d7819b16fc71965ed86ca7e10f6be48c5997a13512fb8d77f56d3bf13b74
nss-devel-3.19.1-4.el5_11.x86_64.rpm SHA-256: 65ddd0935783f0ac00c61fd3e13d7fb6509f01d3afa423c7dbfdb4c3aabc4281
nss-pkcs11-devel-3.19.1-4.el5_11.i386.rpm SHA-256: 333a39e4714a367ac8f46a26c3adb6981b8e54b09b4a241c43a84c0a2a8195fd
nss-pkcs11-devel-3.19.1-4.el5_11.x86_64.rpm SHA-256: fb02c20684a651c675e5b81fcba40487e1c8e6cfdcb90d261888347980b9bef9
nss-tools-3.19.1-4.el5_11.x86_64.rpm SHA-256: 8076efffecd7eb91da1bb1115921bfd4b250e599597c1daeb920a9e620fa7550
i386
nss-3.19.1-4.el5_11.i386.rpm SHA-256: 450dd70148a25759d516bb7f9ee6864a8038221cd23cffa78dd4c97a6fcaf5b2
nss-debuginfo-3.19.1-4.el5_11.i386.rpm SHA-256: e1dca4fae0064ec73069503185f570703b50abe5d1186e83465d84fbc0ad01dd
nss-debuginfo-3.19.1-4.el5_11.i386.rpm SHA-256: e1dca4fae0064ec73069503185f570703b50abe5d1186e83465d84fbc0ad01dd
nss-devel-3.19.1-4.el5_11.i386.rpm SHA-256: 7d77d7819b16fc71965ed86ca7e10f6be48c5997a13512fb8d77f56d3bf13b74
nss-pkcs11-devel-3.19.1-4.el5_11.i386.rpm SHA-256: 333a39e4714a367ac8f46a26c3adb6981b8e54b09b4a241c43a84c0a2a8195fd
nss-tools-3.19.1-4.el5_11.i386.rpm SHA-256: 8fe0677dc573438c67b08a066581839480190c417fd42f45b426bf9a35a27693

Red Hat Enterprise Linux Desktop 5

SRPM
nss-3.19.1-4.el5_11.src.rpm SHA-256: e2ed10921358fe438dc597b79575e0288375277682c1f794f616d118703cec72
x86_64
nss-3.19.1-4.el5_11.i386.rpm SHA-256: 450dd70148a25759d516bb7f9ee6864a8038221cd23cffa78dd4c97a6fcaf5b2
nss-3.19.1-4.el5_11.x86_64.rpm SHA-256: 943076eece09883a2319211f72064bb9cbd3ca45ee8f0d754a58e0a91e38ea8b
nss-debuginfo-3.19.1-4.el5_11.i386.rpm SHA-256: e1dca4fae0064ec73069503185f570703b50abe5d1186e83465d84fbc0ad01dd
nss-debuginfo-3.19.1-4.el5_11.x86_64.rpm SHA-256: 72a6d9440442e9e6765d9f22877b72a83bfa00dcfe9a704b50e565f69795d1d3
nss-tools-3.19.1-4.el5_11.x86_64.rpm SHA-256: 8076efffecd7eb91da1bb1115921bfd4b250e599597c1daeb920a9e620fa7550
i386
nss-3.19.1-4.el5_11.i386.rpm SHA-256: 450dd70148a25759d516bb7f9ee6864a8038221cd23cffa78dd4c97a6fcaf5b2
nss-debuginfo-3.19.1-4.el5_11.i386.rpm SHA-256: e1dca4fae0064ec73069503185f570703b50abe5d1186e83465d84fbc0ad01dd
nss-tools-3.19.1-4.el5_11.i386.rpm SHA-256: 8fe0677dc573438c67b08a066581839480190c417fd42f45b426bf9a35a27693

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
nss-3.19.1-4.el5_11.src.rpm SHA-256: e2ed10921358fe438dc597b79575e0288375277682c1f794f616d118703cec72
s390x
nss-3.19.1-4.el5_11.s390.rpm SHA-256: 0c6e38e62e89941560c23c04f2a6bbc1015a484f8859719d323680f1de3574c1
nss-3.19.1-4.el5_11.s390x.rpm SHA-256: 203c91421553c236aa4510142607ad9faa771e3ede0b4ea1f189e21d447feb46
nss-debuginfo-3.19.1-4.el5_11.s390.rpm SHA-256: c72d63adf72c06f88911d929276e94f8e178629a66b01ca12eddfa25df7da77c
nss-debuginfo-3.19.1-4.el5_11.s390x.rpm SHA-256: efd7c0a5246413c2b753a562948d24ca4c30746925281295ef4fbc34cf749f41
nss-devel-3.19.1-4.el5_11.s390.rpm SHA-256: e954423ebfc1da59eaf7323b08824d8eac9757e8944dd6dcbd1546eedd98392a
nss-devel-3.19.1-4.el5_11.s390x.rpm SHA-256: e6969d38708320399711a4d97829d92643899420cfd11608eafe12437435474e
nss-pkcs11-devel-3.19.1-4.el5_11.s390.rpm SHA-256: 73506eaa4e80c3bd63fc77724d5861a7d2c8288d1042057629e5630b6f0f7612
nss-pkcs11-devel-3.19.1-4.el5_11.s390x.rpm SHA-256: ed427c79215cfc23771c775776ea90e4d10601f069f65e41806f6dabda2caade
nss-tools-3.19.1-4.el5_11.s390x.rpm SHA-256: 7a9873d6f863882a8456341af4ac51c03b4f88586872accb5143c2865f0b2f8a

Red Hat Enterprise Linux for Power, big endian 5

SRPM
nss-3.19.1-4.el5_11.src.rpm SHA-256: e2ed10921358fe438dc597b79575e0288375277682c1f794f616d118703cec72
ppc
nss-3.19.1-4.el5_11.ppc.rpm SHA-256: b25d4537c0b393d46ec963030f6fc920e062f70a38dc63ff575a7fc875dd03cf
nss-3.19.1-4.el5_11.ppc64.rpm SHA-256: d037cd5df70a5548f0f6fb385e0cdfaa45c1a08ba0c3377c0e39461925b08d68
nss-debuginfo-3.19.1-4.el5_11.ppc.rpm SHA-256: 3232b8e8c0ca0442031caf6ee5cfc59b164ddbae71ea0647877d8e000a20dc93
nss-debuginfo-3.19.1-4.el5_11.ppc64.rpm SHA-256: a935fa28c0fe4abd58ee34124089aa04c36f83032b86ca2425b03773b0e412e0
nss-devel-3.19.1-4.el5_11.ppc.rpm SHA-256: f34e24e14ba59f3d4c6cfe02155fe10bbb4ad62a8d41e356477a22ef35f84238
nss-devel-3.19.1-4.el5_11.ppc64.rpm SHA-256: f25ab7119e9df59585263f5fabc8ca336d592d16ef2e742ad0cbcf9b83a4ae6f
nss-pkcs11-devel-3.19.1-4.el5_11.ppc.rpm SHA-256: 8e0c8f779047f96ed7511e28b159e4dfc4aa2fbd6e3aaf6f6529d7c30afe0b74
nss-pkcs11-devel-3.19.1-4.el5_11.ppc64.rpm SHA-256: 55fe6615b778c780abf646158796a8e4d659205dc2f3bb55b5d58dddedf51450
nss-tools-3.19.1-4.el5_11.ppc.rpm SHA-256: 160ef3d5462c29caaaba55dafdaea301158c696a3671f9195a0683f858b76200

Red Hat Enterprise Linux Server from RHUI 5

SRPM
nss-3.19.1-4.el5_11.src.rpm SHA-256: e2ed10921358fe438dc597b79575e0288375277682c1f794f616d118703cec72
x86_64
nss-3.19.1-4.el5_11.i386.rpm SHA-256: 450dd70148a25759d516bb7f9ee6864a8038221cd23cffa78dd4c97a6fcaf5b2
nss-3.19.1-4.el5_11.x86_64.rpm SHA-256: 943076eece09883a2319211f72064bb9cbd3ca45ee8f0d754a58e0a91e38ea8b
nss-debuginfo-3.19.1-4.el5_11.i386.rpm SHA-256: e1dca4fae0064ec73069503185f570703b50abe5d1186e83465d84fbc0ad01dd
nss-debuginfo-3.19.1-4.el5_11.x86_64.rpm SHA-256: 72a6d9440442e9e6765d9f22877b72a83bfa00dcfe9a704b50e565f69795d1d3
nss-devel-3.19.1-4.el5_11.i386.rpm SHA-256: 7d77d7819b16fc71965ed86ca7e10f6be48c5997a13512fb8d77f56d3bf13b74
nss-devel-3.19.1-4.el5_11.x86_64.rpm SHA-256: 65ddd0935783f0ac00c61fd3e13d7fb6509f01d3afa423c7dbfdb4c3aabc4281
nss-pkcs11-devel-3.19.1-4.el5_11.i386.rpm SHA-256: 333a39e4714a367ac8f46a26c3adb6981b8e54b09b4a241c43a84c0a2a8195fd
nss-pkcs11-devel-3.19.1-4.el5_11.x86_64.rpm SHA-256: fb02c20684a651c675e5b81fcba40487e1c8e6cfdcb90d261888347980b9bef9
nss-tools-3.19.1-4.el5_11.x86_64.rpm SHA-256: 8076efffecd7eb91da1bb1115921bfd4b250e599597c1daeb920a9e620fa7550
i386
nss-3.19.1-4.el5_11.i386.rpm SHA-256: 450dd70148a25759d516bb7f9ee6864a8038221cd23cffa78dd4c97a6fcaf5b2
nss-debuginfo-3.19.1-4.el5_11.i386.rpm SHA-256: e1dca4fae0064ec73069503185f570703b50abe5d1186e83465d84fbc0ad01dd
nss-devel-3.19.1-4.el5_11.i386.rpm SHA-256: 7d77d7819b16fc71965ed86ca7e10f6be48c5997a13512fb8d77f56d3bf13b74
nss-pkcs11-devel-3.19.1-4.el5_11.i386.rpm SHA-256: 333a39e4714a367ac8f46a26c3adb6981b8e54b09b4a241c43a84c0a2a8195fd
nss-tools-3.19.1-4.el5_11.i386.rpm SHA-256: 8fe0677dc573438c67b08a066581839480190c417fd42f45b426bf9a35a27693

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility