- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0291 - nss and nspr bug fix update
Synopsis
nss and nspr bug fix update
Type/Severity
Bug Fix Advisory (none)
Topic
Updated nss and nspr packages that fix three bugs and add one enhancement are now available for Red Hat Enterprise Linux 5.
Description
The Network Security Services (NSS) libraries support the cross-platform development of security-enabled clients and server applications, the Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities.
This update fixes the following bugs:
-
Prior to this update, the selinux policy for mod_nss did not allow for correct handling of access vector caches (AVC). As a consequence, AVC could fail when running NSS. This update modifies the selinux policy so that AVC is handled as expected. (BZ#348761)
-
Prior to this update, the crmf library used a maximum length of 2048 bits for wrapped private keys. As a consequence, private keys exceeding the maximum lengths failed. With this update, the maximum key length is now identical with the the maximum modulus length. (BZ#704595)
-
Prior to this update, certain file descriptors were not closed. As a consequence, a file descriptor leak resulted upon continued reloading of the httpd service. This update modifies the underlying code and the descriptors are now correctly closed. (BZ#713373)
All NSS and NSPR users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.
Solution
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.https://access.redhat.com/kb/docs/DOC-11259
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Power, big endian | 5 | ppc |
| Red Hat Enterprise Linux for IBM z Systems | 5 | s390x |
| Red Hat Enterprise Linux Workstation | 5 | x86_64 |
| Red Hat Enterprise Linux Workstation | 5 | i386 |
| Red Hat Enterprise Linux Server | 5 | x86_64 |
| Red Hat Enterprise Linux Server | 5 | ia64 |
| Red Hat Enterprise Linux Server | 5 | i386 |
| Red Hat Enterprise Linux Server from RHUI | 5 | x86_64 |
| Red Hat Enterprise Linux Server from RHUI | 5 | i386 |
| Red Hat Enterprise Linux Desktop | 5 | x86_64 |
| Red Hat Enterprise Linux Desktop | 5 | i386 |
Updated Packages
- nss-tools-3.12.10-8.el5.ppc.rpm
- nss-3.12.10-8.el5.ppc.rpm
- nss-tools-3.12.10-8.el5.i386.rpm
- nspr-4.8.8-2.el5.s390x.rpm
- nss-3.12.10-8.el5.ppc64.rpm
- nspr-devel-4.8.8-2.el5.ppc.rpm
- nss-tools-3.12.10-8.el5.s390x.rpm
- nss-3.12.10-8.el5.i386.rpm
- nspr-4.8.8-2.el5.s390.rpm
- nss-3.12.10-8.el5.x86_64.rpm
- nspr-4.8.8-2.el5.ppc64.rpm
- nspr-devel-4.8.8-2.el5.s390.rpm
- nss-3.12.10-8.el5.s390x.rpm
- nss-tools-3.12.10-8.el5.x86_64.rpm
- nss-pkcs11-devel-3.12.10-8.el5.ppc.rpm
- nspr-devel-4.8.8-2.el5.ppc64.rpm
- nss-devel-3.12.10-8.el5.s390.rpm
- nss-pkcs11-devel-3.12.10-8.el5.ppc64.rpm
- nss-3.12.10-8.el5.ia64.rpm
- nss-3.12.10-8.el5.src.rpm
- nspr-devel-4.8.8-2.el5.x86_64.rpm
- nspr-devel-4.8.8-2.el5.s390x.rpm
- nspr-4.8.8-2.el5.ppc.rpm
- nss-pkcs11-devel-3.12.10-8.el5.x86_64.rpm
- nss-devel-3.12.10-8.el5.ppc64.rpm
- nss-pkcs11-devel-3.12.10-8.el5.s390x.rpm
- nspr-4.8.8-2.el5.x86_64.rpm
- nss-devel-3.12.10-8.el5.s390x.rpm
- nspr-devel-4.8.8-2.el5.ia64.rpm
- nss-devel-3.12.10-8.el5.ppc.rpm
- nss-devel-3.12.10-8.el5.x86_64.rpm
- nspr-4.8.8-2.el5.ia64.rpm
- nss-pkcs11-devel-3.12.10-8.el5.s390.rpm
- nss-devel-3.12.10-8.el5.i386.rpm
- nspr-devel-4.8.8-2.el5.i386.rpm
- nss-3.12.10-8.el5.s390.rpm
- nss-pkcs11-devel-3.12.10-8.el5.ia64.rpm
- nss-tools-3.12.10-8.el5.ia64.rpm
- nspr-4.8.8-2.el5.i386.rpm
- nss-pkcs11-devel-3.12.10-8.el5.i386.rpm
- nspr-4.8.8-2.el5.src.rpm
- nss-devel-3.12.10-8.el5.ia64.rpm
Fixes
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.