|Category:||CentOS Local Security Checks|
|Title:||CentOS Update for nss CESA-2014:1073 centos7|
|Summary:||The remote host is missing an update for the 'nss'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'nss'
package(s) announced via the referenced advisory.
Network Security Services (NSS) is a set
of libraries designed to support the cross-platform development of
security-enabled client and server applications. Applications built with NSS can
support SSLv3, TLS, and other security standards.
It was found that the implementation of Internationalizing Domain Names in
Applications (IDNA) hostname matching in NSS did not follow the RFC 6125
recommendations. This could lead to certain invalid certificates with
international characters to be accepted as valid. (CVE-2014-1492)
In addition, the nss, nss-util, and nss-softokn packages have been upgraded
to upstream version 3.16.2, which provides a number of bug fixes and
enhancements over the previous versions. (BZ#1124659)
Users of NSS are advised to upgrade to these updated packages, which
correct these issues and add these enhancements. After installing this
update, applications using NSS must be restarted for this update to
nss on CentOS 7
Please install the updated packages.
Common Vulnerability Exposure (CVE) ID: CVE-2014-1492|
BugTraq ID: 66356
Bugtraq: 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (Google Search)
Debian Security Information: DSA-2994 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0665 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0727 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:0599 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:0629 (Google Search)
|Copyright||Copyright (C) 2014 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.