|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for nss, nss-util, nss-softokn RHSA-2014:1073-01|
|Summary:||The remote host is missing an update for the 'nss, nss-util, nss-softokn'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'nss, nss-util, nss-softokn'
package(s) announced via the referenced advisory.
Network Security Services (NSS) is a set of libraries designed to support
the cross-platform development of security-enabled client and server
applications. Applications built with NSS can support SSLv3, TLS, and other
It was found that the implementation of Internationalizing Domain Names in
Applications (IDNA) hostname matching in NSS did not follow the RFC 6125
recommendations. This could lead to certain invalid certificates with
international characters to be accepted as valid. (CVE-2014-1492)
In addition, the nss, nss-util, and nss-softokn packages have been upgraded
to upstream version 3.16.2, which provides a number of bug fixes and
enhancements over the previous versions. (BZ#1124659)
Users of NSS are advised to upgrade to these updated packages, which
correct these issues and add these enhancements. After installing this
update, applications using NSS must be restarted for this update to
nss, nss-util, nss-softokn on Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2014-1492|
BugTraq ID: 66356
Bugtraq: 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (Google Search)
Debian Security Information: DSA-2994 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0665 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0727 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:0599 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:0629 (Google Search)
|Copyright||Copyright (C) 2014 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.