Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:1369: Red Hat Security Advisory: nss security update

An update for nss is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-0767: The Mozilla Foundation Security Advisory describes this flaw as: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled.
Red Hat Security Data
#vulnerability#linux#red_hat#ibm#firefox#sap

Synopsis

Important: nss security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for nss is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.

Security Fix(es):

  • nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, applications using NSS (for example, Firefox) must be restarted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2170377 - CVE-2023-0767 nss: Arbitrary memory write via PKCS 12

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

nss-3.79.0-11.el8_6.src.rpm

SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a

x86_64

nss-3.79.0-11.el8_6.i686.rpm

SHA-256: 22698f9b5c6474795d0d1bb4f61b423a96c0bd5f7cca926a5cce0435108aea06

nss-3.79.0-11.el8_6.x86_64.rpm

SHA-256: bdc82d43716a04aed7ee58816af1f97c0068fd27c7221b70e54d85172f9abc7c

nss-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 3bd50b95f12cab7996d9b6057a883449ec43167b1aefb2915c47d7fbfe2cb745

nss-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 7831346743e482adbb39343eabea6b45151bdd65e52ef3c1868f81e8208b0f1c

nss-debugsource-3.79.0-11.el8_6.i686.rpm

SHA-256: 0f8d643cb01f7e02c72b70fbc0415a6617c21592fd084317efb61e7b6ed345a8

nss-debugsource-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 3e74844b1005376ad09d96b5826119b9e6287b9dfcf7b4a510618a95bada9435

nss-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: 2d4de4a8e5f92031c8eb50defe660a1ece8bc42edae222cdcc882fa56506ae2f

nss-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: a15275e70baf60d350b8376b035e35a52e3987a736e471a6c907bf0e03eba143

nss-softokn-3.79.0-11.el8_6.i686.rpm

SHA-256: b7747add0068a9427ab861b3527eae309a12d8872a3a430539b3a9ddc5db1552

nss-softokn-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 15aea95ab0226ff8b3e7666da34feec396572c6f262f428df498e6af0fbcf486

nss-softokn-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 3d74ae8064b7509d63b8f62f88ddad47c3d44154e7904d0de0f508e8ea5d2d25

nss-softokn-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 25d7ce3511880ecb8bf74732da430f082510b461828097ba1a39958081b5177b

nss-softokn-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: 1ea85c9a05969561252b5a5cc05fb7667cdc80c232e358d21e967a9b49d4df7a

nss-softokn-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 7e5e951eb86f0e495ecf2bddbadb7e78e2ac1caffbf560d0c1a66e8c0bb14c81

nss-softokn-freebl-3.79.0-11.el8_6.i686.rpm

SHA-256: 00940e5d342425b977a2ef8ee3528f1c86f84cac555f971b6fed53d17bdd9813

nss-softokn-freebl-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 7f161b3e7e98327a0d7e9000fe75a35d4c4666cec0947e8f5a95c9c9b785e417

nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 9539e03fffc543d9a774cb83442be5bfc1ea0021c5850cdd776464b2efa5c92c

nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: e695589bc8f83e885a6bd62a31fc65c43ee749e0d133aac9ecc08d27cfb5cb12

nss-softokn-freebl-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: 2d148ef1e6318bf4bbe01606033fa4ed3b1b346e37708e93fcccfc507a8bf43c

nss-softokn-freebl-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: c1535bd5e87b6c85bb2238b021fadeda8f9251f63cb278ac2a90cc2732aa0a98

nss-sysinit-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 9dad45bed9b1e178b180b9332598da141e3794f38c9ae1774282ecc2b8f6561e

nss-sysinit-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 668f709ce1792e48fdbc903f17e0e4e06cb84cc3f96e6322eb496c08fd0c50b4

nss-sysinit-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: acd338329a1f9f416ced9dd39785c41b9a28a622492e527ddedc8ef589085f2c

nss-tools-3.79.0-11.el8_6.x86_64.rpm

SHA-256: f4c4ec1b9e90a1a8cb76e49daa1a4af0bd1c3c81cf2961a35e6a8b1c2aff28d3

nss-tools-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: b61de8b4e0ef5e07d5f75b7dd59d2de19469d27ad97349fd4e51cda102541f64

nss-tools-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: f5afeb6046d2fb458bdca2e5b17385568aacba567257c896784f9062c969ef22

nss-util-3.79.0-11.el8_6.i686.rpm

SHA-256: ddb56f7b5d8130dfb2a0283d199083543291dd1f9370fcfa7fb11492f053b0fb

nss-util-3.79.0-11.el8_6.x86_64.rpm

SHA-256: d6d5145d43e12e86af66da9e77a36162c4bf9a6c705c25be9f40a67e540b6c37

nss-util-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: d15ded3c9e2eb9757eb26007755275488d76fd0d148c0909e0cf50fb1d1cb6b3

nss-util-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: c43869f3261dc2023c54a1fa5f89ac761e9cd854115d2be47385ef7a3729146c

nss-util-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: efcb78b913c7e2f9b9f8c3757b8c3d8d136cf70593772455bc28e14ce8bebfa6

nss-util-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 08449870c9e59d83f666b45cdf4eae8d1a895adb1a3147dbd511575a1247afcc

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

nss-3.79.0-11.el8_6.src.rpm

SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a

x86_64

nss-3.79.0-11.el8_6.i686.rpm

SHA-256: 22698f9b5c6474795d0d1bb4f61b423a96c0bd5f7cca926a5cce0435108aea06

nss-3.79.0-11.el8_6.x86_64.rpm

SHA-256: bdc82d43716a04aed7ee58816af1f97c0068fd27c7221b70e54d85172f9abc7c

nss-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 3bd50b95f12cab7996d9b6057a883449ec43167b1aefb2915c47d7fbfe2cb745

nss-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 7831346743e482adbb39343eabea6b45151bdd65e52ef3c1868f81e8208b0f1c

nss-debugsource-3.79.0-11.el8_6.i686.rpm

SHA-256: 0f8d643cb01f7e02c72b70fbc0415a6617c21592fd084317efb61e7b6ed345a8

nss-debugsource-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 3e74844b1005376ad09d96b5826119b9e6287b9dfcf7b4a510618a95bada9435

nss-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: 2d4de4a8e5f92031c8eb50defe660a1ece8bc42edae222cdcc882fa56506ae2f

nss-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: a15275e70baf60d350b8376b035e35a52e3987a736e471a6c907bf0e03eba143

nss-softokn-3.79.0-11.el8_6.i686.rpm

SHA-256: b7747add0068a9427ab861b3527eae309a12d8872a3a430539b3a9ddc5db1552

nss-softokn-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 15aea95ab0226ff8b3e7666da34feec396572c6f262f428df498e6af0fbcf486

nss-softokn-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 3d74ae8064b7509d63b8f62f88ddad47c3d44154e7904d0de0f508e8ea5d2d25

nss-softokn-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 25d7ce3511880ecb8bf74732da430f082510b461828097ba1a39958081b5177b

nss-softokn-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: 1ea85c9a05969561252b5a5cc05fb7667cdc80c232e358d21e967a9b49d4df7a

nss-softokn-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 7e5e951eb86f0e495ecf2bddbadb7e78e2ac1caffbf560d0c1a66e8c0bb14c81

nss-softokn-freebl-3.79.0-11.el8_6.i686.rpm

SHA-256: 00940e5d342425b977a2ef8ee3528f1c86f84cac555f971b6fed53d17bdd9813

nss-softokn-freebl-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 7f161b3e7e98327a0d7e9000fe75a35d4c4666cec0947e8f5a95c9c9b785e417

nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 9539e03fffc543d9a774cb83442be5bfc1ea0021c5850cdd776464b2efa5c92c

nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: e695589bc8f83e885a6bd62a31fc65c43ee749e0d133aac9ecc08d27cfb5cb12

nss-softokn-freebl-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: 2d148ef1e6318bf4bbe01606033fa4ed3b1b346e37708e93fcccfc507a8bf43c

nss-softokn-freebl-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: c1535bd5e87b6c85bb2238b021fadeda8f9251f63cb278ac2a90cc2732aa0a98

nss-sysinit-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 9dad45bed9b1e178b180b9332598da141e3794f38c9ae1774282ecc2b8f6561e

nss-sysinit-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 668f709ce1792e48fdbc903f17e0e4e06cb84cc3f96e6322eb496c08fd0c50b4

nss-sysinit-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: acd338329a1f9f416ced9dd39785c41b9a28a622492e527ddedc8ef589085f2c

nss-tools-3.79.0-11.el8_6.x86_64.rpm

SHA-256: f4c4ec1b9e90a1a8cb76e49daa1a4af0bd1c3c81cf2961a35e6a8b1c2aff28d3

nss-tools-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: b61de8b4e0ef5e07d5f75b7dd59d2de19469d27ad97349fd4e51cda102541f64

nss-tools-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: f5afeb6046d2fb458bdca2e5b17385568aacba567257c896784f9062c969ef22

nss-util-3.79.0-11.el8_6.i686.rpm

SHA-256: ddb56f7b5d8130dfb2a0283d199083543291dd1f9370fcfa7fb11492f053b0fb

nss-util-3.79.0-11.el8_6.x86_64.rpm

SHA-256: d6d5145d43e12e86af66da9e77a36162c4bf9a6c705c25be9f40a67e540b6c37

nss-util-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: d15ded3c9e2eb9757eb26007755275488d76fd0d148c0909e0cf50fb1d1cb6b3

nss-util-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: c43869f3261dc2023c54a1fa5f89ac761e9cd854115d2be47385ef7a3729146c

nss-util-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: efcb78b913c7e2f9b9f8c3757b8c3d8d136cf70593772455bc28e14ce8bebfa6

nss-util-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 08449870c9e59d83f666b45cdf4eae8d1a895adb1a3147dbd511575a1247afcc

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

nss-3.79.0-11.el8_6.src.rpm

SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a

s390x

nss-3.79.0-11.el8_6.s390x.rpm

SHA-256: 3065a5d80decaea3e00a4c33fe056b197936e680421f5312ae976c7cdf3ce05e

nss-debuginfo-3.79.0-11.el8_6.s390x.rpm

SHA-256: ced40ceddd1ef750c32645964ba9964fc44a097106487a9624cd58fb38bc2d48

nss-debugsource-3.79.0-11.el8_6.s390x.rpm

SHA-256: 749fc0cd33d4048d4c2581956a68bd60ddcaf0efdffa5771b4e65e2fd9451ebe

nss-devel-3.79.0-11.el8_6.s390x.rpm

SHA-256: 4ba9cef85621832df7433a24caec09b0860496af42eaffa69dc2e76088b2d4e5

nss-softokn-3.79.0-11.el8_6.s390x.rpm

SHA-256: 8c663ef9f9ac75f1ea63e2cde772eda511096f76b1e5b7a072cf2fbf705ff95e

nss-softokn-debuginfo-3.79.0-11.el8_6.s390x.rpm

SHA-256: 5149866a296851a856dd22238c5424e38b97850763686727f55e3b7e2be3e31b

nss-softokn-devel-3.79.0-11.el8_6.s390x.rpm

SHA-256: c32d88657b57d16741a52e1234c9e3348ad01bbd0a2242edc6f75eaa8d1f85c2

nss-softokn-freebl-3.79.0-11.el8_6.s390x.rpm

SHA-256: 5ce2cab1dfd9edcffccbb4b8aa4c1cea333d22db8801e9c81492596e9bea6713

nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.s390x.rpm

SHA-256: f50663fd0f233354afee0d2551ed4263e6861f543d083b990cf6d864a7ee6017

nss-softokn-freebl-devel-3.79.0-11.el8_6.s390x.rpm

SHA-256: 0e4e9a7dc4c8da42201d2a4096fd2afe908dc803c1bae6d3585a454911cea7bd

nss-sysinit-3.79.0-11.el8_6.s390x.rpm

SHA-256: 4d181b2efbd38c2a3040e1a45b222e9c3c6b344b68c9015e22ebde85362c195b

nss-sysinit-debuginfo-3.79.0-11.el8_6.s390x.rpm

SHA-256: d8af63b9ca6fad25731b33e824ff2f74b3d9303dd87341f84fa343e7448aac88

nss-tools-3.79.0-11.el8_6.s390x.rpm

SHA-256: 06aa98caeca6a457602c10327551e4d95518803bc8401ad8833b6f70a2888406

nss-tools-debuginfo-3.79.0-11.el8_6.s390x.rpm

SHA-256: 305fb04458e8e8bb04ee0d2180a0c559c706a9d86d6f1fd1df8ba109a5bcdc56

nss-util-3.79.0-11.el8_6.s390x.rpm

SHA-256: cd665ed70275e0f531e6a58401c9e22069f8939d3cc0f9430e31297608ce5871

nss-util-debuginfo-3.79.0-11.el8_6.s390x.rpm

SHA-256: 9d26fa2dd7b8591bbe81e39e8051bc413eaf70c02858c29cf1496b64cd874c1f

nss-util-devel-3.79.0-11.el8_6.s390x.rpm

SHA-256: 49c28a9492212cb54497dee581fd3c3d58d07f0590792d501188804acd229c5a

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

nss-3.79.0-11.el8_6.src.rpm

SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a

ppc64le

nss-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: c19a6d166c4970e224e0161bc9418119d0979e7d85c3991683098409c1d00e13

nss-debuginfo-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: a3cb0e2ace9f53581bc3f52f2631625e2287a6064207b54dad109d1b68c6c642

nss-debugsource-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: d39451013527e5a87f2c9d5764153d2cbc1bd65350b44357b2aeaf0177dbd2fc

nss-devel-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: c9d53b973736141e71f8da147dde2c87790a6467fd8abc98cc474ae167ad1e6c

nss-softokn-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: b64114ffbc41db51cac7fd2d3fb418b1d7893fac6349edf6f62841a0d20043a7

nss-softokn-debuginfo-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 31f71d5d76078068404365a5ce10862dd0bf06661c6f09c542e738c051bd3769

nss-softokn-devel-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 4d3cf752c40fec441708a9c1cdeb26572b7c435320cae385b5b786033856fc39

nss-softokn-freebl-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 34d10f7697b687dfc218dabcf2c97177989996843517f09655b945cef813ea3d

nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 1dffc5b4d62fc299b08498d70bca87cc0a7e781f05f0a7fc0c05def7c69b5785

nss-softokn-freebl-devel-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 833f5fc1ddefb96dfa12f13870aedf9e0ca171d51d5e5ac94a769f09b55919fe

nss-sysinit-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 7165a9df9eb847857919269e726e879a97e2666b0e10059009805db448ba278e

nss-sysinit-debuginfo-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 0871354bc6266f65df367a21a3e97701c8ed32b55425a4609fb47c4b41db226b

nss-tools-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: a81d0aa67490c7bf62394850db9cb6bbc04ba65522cbb7c881682d08198e968c

nss-tools-debuginfo-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 82d931ec51b4cb2978780b5a0a24719886a62d68c8f017619018060fad771f96

nss-util-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 2c41a5cee08985d441a1ea2f864715b98a8ab72e269cf0af2e7ead723d8aa12a

nss-util-debuginfo-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: f472675fa0c480521fe805681a7226b736578f8b198839df09271f7a18be1205

nss-util-devel-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 5f8f11c2b831e222c100854886b423ca004cf1ebe90314c4c0175ba9b35a56f3

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

nss-3.79.0-11.el8_6.src.rpm

SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a

x86_64

nss-3.79.0-11.el8_6.i686.rpm

SHA-256: 22698f9b5c6474795d0d1bb4f61b423a96c0bd5f7cca926a5cce0435108aea06

nss-3.79.0-11.el8_6.x86_64.rpm

SHA-256: bdc82d43716a04aed7ee58816af1f97c0068fd27c7221b70e54d85172f9abc7c

nss-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 3bd50b95f12cab7996d9b6057a883449ec43167b1aefb2915c47d7fbfe2cb745

nss-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 7831346743e482adbb39343eabea6b45151bdd65e52ef3c1868f81e8208b0f1c

nss-debugsource-3.79.0-11.el8_6.i686.rpm

SHA-256: 0f8d643cb01f7e02c72b70fbc0415a6617c21592fd084317efb61e7b6ed345a8

nss-debugsource-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 3e74844b1005376ad09d96b5826119b9e6287b9dfcf7b4a510618a95bada9435

nss-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: 2d4de4a8e5f92031c8eb50defe660a1ece8bc42edae222cdcc882fa56506ae2f

nss-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: a15275e70baf60d350b8376b035e35a52e3987a736e471a6c907bf0e03eba143

nss-softokn-3.79.0-11.el8_6.i686.rpm

SHA-256: b7747add0068a9427ab861b3527eae309a12d8872a3a430539b3a9ddc5db1552

nss-softokn-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 15aea95ab0226ff8b3e7666da34feec396572c6f262f428df498e6af0fbcf486

nss-softokn-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 3d74ae8064b7509d63b8f62f88ddad47c3d44154e7904d0de0f508e8ea5d2d25

nss-softokn-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 25d7ce3511880ecb8bf74732da430f082510b461828097ba1a39958081b5177b

nss-softokn-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: 1ea85c9a05969561252b5a5cc05fb7667cdc80c232e358d21e967a9b49d4df7a

nss-softokn-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 7e5e951eb86f0e495ecf2bddbadb7e78e2ac1caffbf560d0c1a66e8c0bb14c81

nss-softokn-freebl-3.79.0-11.el8_6.i686.rpm

SHA-256: 00940e5d342425b977a2ef8ee3528f1c86f84cac555f971b6fed53d17bdd9813

nss-softokn-freebl-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 7f161b3e7e98327a0d7e9000fe75a35d4c4666cec0947e8f5a95c9c9b785e417

nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 9539e03fffc543d9a774cb83442be5bfc1ea0021c5850cdd776464b2efa5c92c

nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: e695589bc8f83e885a6bd62a31fc65c43ee749e0d133aac9ecc08d27cfb5cb12

nss-softokn-freebl-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: 2d148ef1e6318bf4bbe01606033fa4ed3b1b346e37708e93fcccfc507a8bf43c

nss-softokn-freebl-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: c1535bd5e87b6c85bb2238b021fadeda8f9251f63cb278ac2a90cc2732aa0a98

nss-sysinit-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 9dad45bed9b1e178b180b9332598da141e3794f38c9ae1774282ecc2b8f6561e

nss-sysinit-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 668f709ce1792e48fdbc903f17e0e4e06cb84cc3f96e6322eb496c08fd0c50b4

nss-sysinit-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: acd338329a1f9f416ced9dd39785c41b9a28a622492e527ddedc8ef589085f2c

nss-tools-3.79.0-11.el8_6.x86_64.rpm

SHA-256: f4c4ec1b9e90a1a8cb76e49daa1a4af0bd1c3c81cf2961a35e6a8b1c2aff28d3

nss-tools-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: b61de8b4e0ef5e07d5f75b7dd59d2de19469d27ad97349fd4e51cda102541f64

nss-tools-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: f5afeb6046d2fb458bdca2e5b17385568aacba567257c896784f9062c969ef22

nss-util-3.79.0-11.el8_6.i686.rpm

SHA-256: ddb56f7b5d8130dfb2a0283d199083543291dd1f9370fcfa7fb11492f053b0fb

nss-util-3.79.0-11.el8_6.x86_64.rpm

SHA-256: d6d5145d43e12e86af66da9e77a36162c4bf9a6c705c25be9f40a67e540b6c37

nss-util-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: d15ded3c9e2eb9757eb26007755275488d76fd0d148c0909e0cf50fb1d1cb6b3

nss-util-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: c43869f3261dc2023c54a1fa5f89ac761e9cd854115d2be47385ef7a3729146c

nss-util-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: efcb78b913c7e2f9b9f8c3757b8c3d8d136cf70593772455bc28e14ce8bebfa6

nss-util-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 08449870c9e59d83f666b45cdf4eae8d1a895adb1a3147dbd511575a1247afcc

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

nss-3.79.0-11.el8_6.src.rpm

SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a

aarch64

nss-3.79.0-11.el8_6.aarch64.rpm

SHA-256: 8c4e0c22299d9c38b1a459d0fe6c793a539cb92ae48f2f1f86659875ffbfddfd

nss-debuginfo-3.79.0-11.el8_6.aarch64.rpm

SHA-256: c6cb7c54b0224983690ceb48335b47f0bc6654bb7c1c236dde0a69522b63707b

nss-debugsource-3.79.0-11.el8_6.aarch64.rpm

SHA-256: 833781faf36b4b3b9ef17fea239ef1955a07e7003d181f52f28f9e06c3f3f67a

nss-devel-3.79.0-11.el8_6.aarch64.rpm

SHA-256: 9f6d83a91b579e45fc2c8106dff14bf7b550370357bb7f8be13188e03ea97191

nss-softokn-3.79.0-11.el8_6.aarch64.rpm

SHA-256: 3eb29f51d300068ae9086377d8ceb4b67f23d8909c5a8bb013ce9132a964cf46

nss-softokn-debuginfo-3.79.0-11.el8_6.aarch64.rpm

SHA-256: cc6aa6822f78a5451090df42a1308ffb7de3c80509448293ca2cece99c0a01d4

nss-softokn-devel-3.79.0-11.el8_6.aarch64.rpm

SHA-256: 6c802eaed1e6e72d6231465225542645adb11542c02208386fd1ee847245e642

nss-softokn-freebl-3.79.0-11.el8_6.aarch64.rpm

SHA-256: 649e3db398e65f958524c3bdd2418c810d6bebe1f379ec279496940fc7959740

nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.aarch64.rpm

SHA-256: 914ac83992ac6fc03f5063136aadf927041dd9b8e97aa0e551120f26fba07b10

nss-softokn-freebl-devel-3.79.0-11.el8_6.aarch64.rpm

SHA-256: 419642e14cdf65c0702b14832703e6b943d9949299d577c1fad2cd37841fa0c3

nss-sysinit-3.79.0-11.el8_6.aarch64.rpm

SHA-256: b56a53bd14a13fea45b7f10da1ca7996f31877602b49ee7dde46f87ad5f8879a

nss-sysinit-debuginfo-3.79.0-11.el8_6.aarch64.rpm

SHA-256: 5d408e57198bae9d78a08f958a4ed18ffa911cb6587e280e81710908cf7db3e5

nss-tools-3.79.0-11.el8_6.aarch64.rpm

SHA-256: 37fb41bbbf65140c9f086f6419634fc0daa2c73274230a71e483485613f5c940

nss-tools-debuginfo-3.79.0-11.el8_6.aarch64.rpm

SHA-256: 0c4ae05bb5dba3f7cda75f6317abefc14c1dbe98ce08956c395539790c694a1d

nss-util-3.79.0-11.el8_6.aarch64.rpm

SHA-256: 35cbec6b6c147fd22192af446639ca0b10623ab20a7aef5407656adf17aa0708

nss-util-debuginfo-3.79.0-11.el8_6.aarch64.rpm

SHA-256: 1d157047fe0bce397a9b4647fd6c35e0bc3a2e912fba1a47c517a1c4c1429c60

nss-util-devel-3.79.0-11.el8_6.aarch64.rpm

SHA-256: f764cf38c60aa1ec83a4c39a980c9cbf63724eac70a3faec630c675adf185aea

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

nss-3.79.0-11.el8_6.src.rpm

SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a

ppc64le

nss-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: c19a6d166c4970e224e0161bc9418119d0979e7d85c3991683098409c1d00e13

nss-debuginfo-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: a3cb0e2ace9f53581bc3f52f2631625e2287a6064207b54dad109d1b68c6c642

nss-debugsource-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: d39451013527e5a87f2c9d5764153d2cbc1bd65350b44357b2aeaf0177dbd2fc

nss-devel-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: c9d53b973736141e71f8da147dde2c87790a6467fd8abc98cc474ae167ad1e6c

nss-softokn-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: b64114ffbc41db51cac7fd2d3fb418b1d7893fac6349edf6f62841a0d20043a7

nss-softokn-debuginfo-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 31f71d5d76078068404365a5ce10862dd0bf06661c6f09c542e738c051bd3769

nss-softokn-devel-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 4d3cf752c40fec441708a9c1cdeb26572b7c435320cae385b5b786033856fc39

nss-softokn-freebl-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 34d10f7697b687dfc218dabcf2c97177989996843517f09655b945cef813ea3d

nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 1dffc5b4d62fc299b08498d70bca87cc0a7e781f05f0a7fc0c05def7c69b5785

nss-softokn-freebl-devel-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 833f5fc1ddefb96dfa12f13870aedf9e0ca171d51d5e5ac94a769f09b55919fe

nss-sysinit-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 7165a9df9eb847857919269e726e879a97e2666b0e10059009805db448ba278e

nss-sysinit-debuginfo-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 0871354bc6266f65df367a21a3e97701c8ed32b55425a4609fb47c4b41db226b

nss-tools-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: a81d0aa67490c7bf62394850db9cb6bbc04ba65522cbb7c881682d08198e968c

nss-tools-debuginfo-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 82d931ec51b4cb2978780b5a0a24719886a62d68c8f017619018060fad771f96

nss-util-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 2c41a5cee08985d441a1ea2f864715b98a8ab72e269cf0af2e7ead723d8aa12a

nss-util-debuginfo-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: f472675fa0c480521fe805681a7226b736578f8b198839df09271f7a18be1205

nss-util-devel-3.79.0-11.el8_6.ppc64le.rpm

SHA-256: 5f8f11c2b831e222c100854886b423ca004cf1ebe90314c4c0175ba9b35a56f3

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

nss-3.79.0-11.el8_6.src.rpm

SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a

x86_64

nss-3.79.0-11.el8_6.i686.rpm

SHA-256: 22698f9b5c6474795d0d1bb4f61b423a96c0bd5f7cca926a5cce0435108aea06

nss-3.79.0-11.el8_6.x86_64.rpm

SHA-256: bdc82d43716a04aed7ee58816af1f97c0068fd27c7221b70e54d85172f9abc7c

nss-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 3bd50b95f12cab7996d9b6057a883449ec43167b1aefb2915c47d7fbfe2cb745

nss-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 7831346743e482adbb39343eabea6b45151bdd65e52ef3c1868f81e8208b0f1c

nss-debugsource-3.79.0-11.el8_6.i686.rpm

SHA-256: 0f8d643cb01f7e02c72b70fbc0415a6617c21592fd084317efb61e7b6ed345a8

nss-debugsource-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 3e74844b1005376ad09d96b5826119b9e6287b9dfcf7b4a510618a95bada9435

nss-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: 2d4de4a8e5f92031c8eb50defe660a1ece8bc42edae222cdcc882fa56506ae2f

nss-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: a15275e70baf60d350b8376b035e35a52e3987a736e471a6c907bf0e03eba143

nss-softokn-3.79.0-11.el8_6.i686.rpm

SHA-256: b7747add0068a9427ab861b3527eae309a12d8872a3a430539b3a9ddc5db1552

nss-softokn-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 15aea95ab0226ff8b3e7666da34feec396572c6f262f428df498e6af0fbcf486

nss-softokn-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 3d74ae8064b7509d63b8f62f88ddad47c3d44154e7904d0de0f508e8ea5d2d25

nss-softokn-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 25d7ce3511880ecb8bf74732da430f082510b461828097ba1a39958081b5177b

nss-softokn-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: 1ea85c9a05969561252b5a5cc05fb7667cdc80c232e358d21e967a9b49d4df7a

nss-softokn-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 7e5e951eb86f0e495ecf2bddbadb7e78e2ac1caffbf560d0c1a66e8c0bb14c81

nss-softokn-freebl-3.79.0-11.el8_6.i686.rpm

SHA-256: 00940e5d342425b977a2ef8ee3528f1c86f84cac555f971b6fed53d17bdd9813

nss-softokn-freebl-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 7f161b3e7e98327a0d7e9000fe75a35d4c4666cec0947e8f5a95c9c9b785e417

nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 9539e03fffc543d9a774cb83442be5bfc1ea0021c5850cdd776464b2efa5c92c

nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: e695589bc8f83e885a6bd62a31fc65c43ee749e0d133aac9ecc08d27cfb5cb12

nss-softokn-freebl-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: 2d148ef1e6318bf4bbe01606033fa4ed3b1b346e37708e93fcccfc507a8bf43c

nss-softokn-freebl-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: c1535bd5e87b6c85bb2238b021fadeda8f9251f63cb278ac2a90cc2732aa0a98

nss-sysinit-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 9dad45bed9b1e178b180b9332598da141e3794f38c9ae1774282ecc2b8f6561e

nss-sysinit-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: 668f709ce1792e48fdbc903f17e0e4e06cb84cc3f96e6322eb496c08fd0c50b4

nss-sysinit-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: acd338329a1f9f416ced9dd39785c41b9a28a622492e527ddedc8ef589085f2c

nss-tools-3.79.0-11.el8_6.x86_64.rpm

SHA-256: f4c4ec1b9e90a1a8cb76e49daa1a4af0bd1c3c81cf2961a35e6a8b1c2aff28d3

nss-tools-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: b61de8b4e0ef5e07d5f75b7dd59d2de19469d27ad97349fd4e51cda102541f64

nss-tools-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: f5afeb6046d2fb458bdca2e5b17385568aacba567257c896784f9062c969ef22

nss-util-3.79.0-11.el8_6.i686.rpm

SHA-256: ddb56f7b5d8130dfb2a0283d199083543291dd1f9370fcfa7fb11492f053b0fb

nss-util-3.79.0-11.el8_6.x86_64.rpm

SHA-256: d6d5145d43e12e86af66da9e77a36162c4bf9a6c705c25be9f40a67e540b6c37

nss-util-debuginfo-3.79.0-11.el8_6.i686.rpm

SHA-256: d15ded3c9e2eb9757eb26007755275488d76fd0d148c0909e0cf50fb1d1cb6b3

nss-util-debuginfo-3.79.0-11.el8_6.x86_64.rpm

SHA-256: c43869f3261dc2023c54a1fa5f89ac761e9cd854115d2be47385ef7a3729146c

nss-util-devel-3.79.0-11.el8_6.i686.rpm

SHA-256: efcb78b913c7e2f9b9f8c3757b8c3d8d136cf70593772455bc28e14ce8bebfa6

nss-util-devel-3.79.0-11.el8_6.x86_64.rpm

SHA-256: 08449870c9e59d83f666b45cdf4eae8d1a895adb1a3147dbd511575a1247afcc

Related news

RHSA-2023:3455: Red Hat Security Advisory: Release of OpenShift Serverless 1.29.0

OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...

RHSA-2023:2061: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.6 security updates and bug fixes

Multicluster Engine for Kubernetes 2.1.6 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25881: A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.

Red Hat Security Advisory 2023-1677-01

Red Hat Security Advisory 2023-1677-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow and integer overflow vulnerabilities.

RHSA-2023:1310: Red Hat Security Advisory: Logging Subsystem for Red Hat OpenShift - 5.5.9 security update

An update is now available for Logging Subsystem for Red Hat OpenShift - 5.5.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large...

RHSA-2023:1479: Red Hat Security Advisory: firefox security update

An update for firefox is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0767: The Mozilla Foundation Security Advisory describes this flaw as: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. * CVE-2023-25751: A flaw was found in Mozilla. The Mozilla Foundation Security Advisory ...

Red Hat Security Advisory 2023-1252-01

Red Hat Security Advisory 2023-1252-01 - Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.

RHSA-2023:1252: Red Hat Security Advisory: nss security update

An update for nss is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0767: The Mozilla Foundation Security Advisory describes this flaw as: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled.

Ubuntu Security Notice USN-5892-1

Ubuntu Security Notice 5892-1 - It was discovered that NSS incorrectly handled client authentication without a user certificate in the database. A remote attacker could possibly use this issue to cause a NSS client to crash, resulting in a denial of service. This issue only affected Ubuntu 22.10. Christian Holler discovered that NSS incorrectly handled certain PKCS 12 certificated bundles. A remote attacker could use this issue to cause NSS to crash, leading to a denial of service, or possibly execute arbitrary code.

Ubuntu Security Notice USN-5880-1

Ubuntu Security Notice 5880-1 - Christian Holler discovered that Firefox did not properly manage memory when using PKCS 12 Safe Bag attributes. An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes. Johan Carlsson discovered that Firefox did not properly manage child iframe's unredacted URI when using Content-Security-Policy-Report-Only header. An attacker could potentially exploits this to obtain sensitive information.

Red Hat Security Advisory 2023-0809-01

Red Hat Security Advisory 2023-0809-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-0805-01

Red Hat Security Advisory 2023-0805-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-0808-01

Red Hat Security Advisory 2023-0808-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-0811-01

Red Hat Security Advisory 2023-0811-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-0806-01

Red Hat Security Advisory 2023-0806-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Issues addressed include a use-after-free vulnerability.

RHSA-2023:0807: Red Hat Security Advisory: firefox security update

An update for firefox is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0767: The Mozilla Foundation Security Advisory describes this flaw as: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. * CVE-2023-25728: The Mozilla Foundation Security Advisory describes this flaw as: The `Content-Se...