![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.123238 |
Category: | Oracle Linux Local Security Checks |
Title: | Oracle: Security Advisory (ELSA-2014-1948) |
Summary: | The remote host is missing an update for the 'nss, nss-softokn, nss-util' package(s) announced via the ELSA-2014-1948 advisory. |
Description: | Summary: The remote host is missing an update for the 'nss, nss-softokn, nss-util' package(s) announced via the ELSA-2014-1948 advisory. Vulnerability Insight: nss [3.16.2.3-2.0.1.el7_0] - Added nss-vendor.patch to change vendor [3.16.2.3-2] - Restore patch for certutil man page - supply missing options descriptions - Resolves: Bug 1165525 - Upgrade to NSS 3.16.2.3 for Firefox 31.3 [3.16.2.3-1] - Resolves: Bug 1165525 - Upgrade to NSS 3.16.2.3 for Firefox 31.3 - Support TLS_FALLBACK_SCSV in tstclnt and ssltap [3.16.2-8] - Fix crash in stan_GetCERTCertificate - Resolves: Bug 1139349 nss-softokn [3.16.2-3] - Resolves: Bug 1165525 - Upgrade to NSS 3.16.2.3 for Firefox 31.3 [3.16.2-3] - Resolves: Bug 1145433 - CVE-2014-1568 [3.16.2-1] - Update to nss-3.16.2 - Resolves: Bug 1124659 - Rebase RHEL 7.1 to at least NSS-SOFTOKN 3.16.1 (FF 31) [3.15.4-2] - Mass rebuild 2014-01-24 [3.15.3-4] - Rebase to nss-3.15.4 - Resolves: Bug 1054457 - CVE-2013-1740 - Update softokn splitting script to oparate on the upstream pristine source - Using the .gz archives directly, not repackageing as .bz2 ones - Avoid unneeded manual steps that could introduce errors - Update the iquote and build softoken only patches on account of the rebase [3.15.3-3] - Fix to allow level 1 fips mode if the db has no password - Resolves: Bug 852023 - FIPS mode detection does not work [3.15.3-2] - Mass rebuild 2013-12-27 [3.15.3-1] - Rebase to NSS_3_15_3_RTM - Related: Bug 1031463 - CVE-2013-5605 CVE-2013-5606 CVE-2013-1741 [3.15.2-2] - Resolves: rhbz#1020395 - Allow Level 1 FIPS mode if the nss db has no password [3.15.2-1] - Rebase to nss-softoken from nss-3.15.2 - Resolves: rhbz#1012679 - pick up NSS-SOFTOKN 3.15.2 (required for bug 1012656) [3.15.1-3] - Add export NSS_ENABLE_ECC=1 rto the %build and %check sections - Resolves: rhbz#752980 - [7.0 FEAT] Support ECDSA algorithm in the nss package [3.15.1-2] - Remove an obsolete script and adjust the sources numbering accordingly [3.15.1-1] - Update to NSS_3_15_1_RTM [3.15-4] - Split off nss-softokn from the unstripped nss source tar ball [3.15-3] - Update to NSS_3_15_RTM - Require nspr-4.10 or greater - Fix patch that selects tests to run [3.15-0.1.beta.3] - Reverse the last changes since pk11gcmtest properly belongs to nss [3.15-0.1.beta.2] - Add lowhashtest and pk11gcmtest as unsupported tools - Modify nss-softoken-split script to include them in the split [3.15-0.1.beta.1] - Update to NSS_3_15_BETA1 - Update spec file, patches, and helper scripts on account of a shallwer source tree nss-util [3.16.2.1-1] - Resolves: Bug 1165525 - Upgrade to NSS 3.16.2.3 for Firefox 31.3 Affected Software/OS: 'nss, nss-softokn, nss-util' package(s) on Oracle Linux 5, Oracle Linux 6, Oracle Linux 7. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |