Headline
RHSA-2023:1369: Red Hat Security Advisory: nss security update
An update for nss is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-0767: The Mozilla Foundation Security Advisory describes this flaw as: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled.
Synopsis
Important: nss security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for nss is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Security Fix(es):
- nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, applications using NSS (for example, Firefox) must be restarted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
Fixes
- BZ - 2170377 - CVE-2023-0767 nss: Arbitrary memory write via PKCS 12
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
nss-3.79.0-11.el8_6.src.rpm
SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a
x86_64
nss-3.79.0-11.el8_6.i686.rpm
SHA-256: 22698f9b5c6474795d0d1bb4f61b423a96c0bd5f7cca926a5cce0435108aea06
nss-3.79.0-11.el8_6.x86_64.rpm
SHA-256: bdc82d43716a04aed7ee58816af1f97c0068fd27c7221b70e54d85172f9abc7c
nss-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 3bd50b95f12cab7996d9b6057a883449ec43167b1aefb2915c47d7fbfe2cb745
nss-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 7831346743e482adbb39343eabea6b45151bdd65e52ef3c1868f81e8208b0f1c
nss-debugsource-3.79.0-11.el8_6.i686.rpm
SHA-256: 0f8d643cb01f7e02c72b70fbc0415a6617c21592fd084317efb61e7b6ed345a8
nss-debugsource-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 3e74844b1005376ad09d96b5826119b9e6287b9dfcf7b4a510618a95bada9435
nss-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: 2d4de4a8e5f92031c8eb50defe660a1ece8bc42edae222cdcc882fa56506ae2f
nss-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: a15275e70baf60d350b8376b035e35a52e3987a736e471a6c907bf0e03eba143
nss-softokn-3.79.0-11.el8_6.i686.rpm
SHA-256: b7747add0068a9427ab861b3527eae309a12d8872a3a430539b3a9ddc5db1552
nss-softokn-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 15aea95ab0226ff8b3e7666da34feec396572c6f262f428df498e6af0fbcf486
nss-softokn-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 3d74ae8064b7509d63b8f62f88ddad47c3d44154e7904d0de0f508e8ea5d2d25
nss-softokn-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 25d7ce3511880ecb8bf74732da430f082510b461828097ba1a39958081b5177b
nss-softokn-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: 1ea85c9a05969561252b5a5cc05fb7667cdc80c232e358d21e967a9b49d4df7a
nss-softokn-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 7e5e951eb86f0e495ecf2bddbadb7e78e2ac1caffbf560d0c1a66e8c0bb14c81
nss-softokn-freebl-3.79.0-11.el8_6.i686.rpm
SHA-256: 00940e5d342425b977a2ef8ee3528f1c86f84cac555f971b6fed53d17bdd9813
nss-softokn-freebl-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 7f161b3e7e98327a0d7e9000fe75a35d4c4666cec0947e8f5a95c9c9b785e417
nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 9539e03fffc543d9a774cb83442be5bfc1ea0021c5850cdd776464b2efa5c92c
nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: e695589bc8f83e885a6bd62a31fc65c43ee749e0d133aac9ecc08d27cfb5cb12
nss-softokn-freebl-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: 2d148ef1e6318bf4bbe01606033fa4ed3b1b346e37708e93fcccfc507a8bf43c
nss-softokn-freebl-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: c1535bd5e87b6c85bb2238b021fadeda8f9251f63cb278ac2a90cc2732aa0a98
nss-sysinit-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 9dad45bed9b1e178b180b9332598da141e3794f38c9ae1774282ecc2b8f6561e
nss-sysinit-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 668f709ce1792e48fdbc903f17e0e4e06cb84cc3f96e6322eb496c08fd0c50b4
nss-sysinit-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: acd338329a1f9f416ced9dd39785c41b9a28a622492e527ddedc8ef589085f2c
nss-tools-3.79.0-11.el8_6.x86_64.rpm
SHA-256: f4c4ec1b9e90a1a8cb76e49daa1a4af0bd1c3c81cf2961a35e6a8b1c2aff28d3
nss-tools-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: b61de8b4e0ef5e07d5f75b7dd59d2de19469d27ad97349fd4e51cda102541f64
nss-tools-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: f5afeb6046d2fb458bdca2e5b17385568aacba567257c896784f9062c969ef22
nss-util-3.79.0-11.el8_6.i686.rpm
SHA-256: ddb56f7b5d8130dfb2a0283d199083543291dd1f9370fcfa7fb11492f053b0fb
nss-util-3.79.0-11.el8_6.x86_64.rpm
SHA-256: d6d5145d43e12e86af66da9e77a36162c4bf9a6c705c25be9f40a67e540b6c37
nss-util-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: d15ded3c9e2eb9757eb26007755275488d76fd0d148c0909e0cf50fb1d1cb6b3
nss-util-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: c43869f3261dc2023c54a1fa5f89ac761e9cd854115d2be47385ef7a3729146c
nss-util-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: efcb78b913c7e2f9b9f8c3757b8c3d8d136cf70593772455bc28e14ce8bebfa6
nss-util-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 08449870c9e59d83f666b45cdf4eae8d1a895adb1a3147dbd511575a1247afcc
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
nss-3.79.0-11.el8_6.src.rpm
SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a
x86_64
nss-3.79.0-11.el8_6.i686.rpm
SHA-256: 22698f9b5c6474795d0d1bb4f61b423a96c0bd5f7cca926a5cce0435108aea06
nss-3.79.0-11.el8_6.x86_64.rpm
SHA-256: bdc82d43716a04aed7ee58816af1f97c0068fd27c7221b70e54d85172f9abc7c
nss-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 3bd50b95f12cab7996d9b6057a883449ec43167b1aefb2915c47d7fbfe2cb745
nss-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 7831346743e482adbb39343eabea6b45151bdd65e52ef3c1868f81e8208b0f1c
nss-debugsource-3.79.0-11.el8_6.i686.rpm
SHA-256: 0f8d643cb01f7e02c72b70fbc0415a6617c21592fd084317efb61e7b6ed345a8
nss-debugsource-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 3e74844b1005376ad09d96b5826119b9e6287b9dfcf7b4a510618a95bada9435
nss-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: 2d4de4a8e5f92031c8eb50defe660a1ece8bc42edae222cdcc882fa56506ae2f
nss-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: a15275e70baf60d350b8376b035e35a52e3987a736e471a6c907bf0e03eba143
nss-softokn-3.79.0-11.el8_6.i686.rpm
SHA-256: b7747add0068a9427ab861b3527eae309a12d8872a3a430539b3a9ddc5db1552
nss-softokn-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 15aea95ab0226ff8b3e7666da34feec396572c6f262f428df498e6af0fbcf486
nss-softokn-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 3d74ae8064b7509d63b8f62f88ddad47c3d44154e7904d0de0f508e8ea5d2d25
nss-softokn-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 25d7ce3511880ecb8bf74732da430f082510b461828097ba1a39958081b5177b
nss-softokn-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: 1ea85c9a05969561252b5a5cc05fb7667cdc80c232e358d21e967a9b49d4df7a
nss-softokn-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 7e5e951eb86f0e495ecf2bddbadb7e78e2ac1caffbf560d0c1a66e8c0bb14c81
nss-softokn-freebl-3.79.0-11.el8_6.i686.rpm
SHA-256: 00940e5d342425b977a2ef8ee3528f1c86f84cac555f971b6fed53d17bdd9813
nss-softokn-freebl-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 7f161b3e7e98327a0d7e9000fe75a35d4c4666cec0947e8f5a95c9c9b785e417
nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 9539e03fffc543d9a774cb83442be5bfc1ea0021c5850cdd776464b2efa5c92c
nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: e695589bc8f83e885a6bd62a31fc65c43ee749e0d133aac9ecc08d27cfb5cb12
nss-softokn-freebl-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: 2d148ef1e6318bf4bbe01606033fa4ed3b1b346e37708e93fcccfc507a8bf43c
nss-softokn-freebl-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: c1535bd5e87b6c85bb2238b021fadeda8f9251f63cb278ac2a90cc2732aa0a98
nss-sysinit-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 9dad45bed9b1e178b180b9332598da141e3794f38c9ae1774282ecc2b8f6561e
nss-sysinit-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 668f709ce1792e48fdbc903f17e0e4e06cb84cc3f96e6322eb496c08fd0c50b4
nss-sysinit-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: acd338329a1f9f416ced9dd39785c41b9a28a622492e527ddedc8ef589085f2c
nss-tools-3.79.0-11.el8_6.x86_64.rpm
SHA-256: f4c4ec1b9e90a1a8cb76e49daa1a4af0bd1c3c81cf2961a35e6a8b1c2aff28d3
nss-tools-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: b61de8b4e0ef5e07d5f75b7dd59d2de19469d27ad97349fd4e51cda102541f64
nss-tools-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: f5afeb6046d2fb458bdca2e5b17385568aacba567257c896784f9062c969ef22
nss-util-3.79.0-11.el8_6.i686.rpm
SHA-256: ddb56f7b5d8130dfb2a0283d199083543291dd1f9370fcfa7fb11492f053b0fb
nss-util-3.79.0-11.el8_6.x86_64.rpm
SHA-256: d6d5145d43e12e86af66da9e77a36162c4bf9a6c705c25be9f40a67e540b6c37
nss-util-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: d15ded3c9e2eb9757eb26007755275488d76fd0d148c0909e0cf50fb1d1cb6b3
nss-util-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: c43869f3261dc2023c54a1fa5f89ac761e9cd854115d2be47385ef7a3729146c
nss-util-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: efcb78b913c7e2f9b9f8c3757b8c3d8d136cf70593772455bc28e14ce8bebfa6
nss-util-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 08449870c9e59d83f666b45cdf4eae8d1a895adb1a3147dbd511575a1247afcc
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
nss-3.79.0-11.el8_6.src.rpm
SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a
s390x
nss-3.79.0-11.el8_6.s390x.rpm
SHA-256: 3065a5d80decaea3e00a4c33fe056b197936e680421f5312ae976c7cdf3ce05e
nss-debuginfo-3.79.0-11.el8_6.s390x.rpm
SHA-256: ced40ceddd1ef750c32645964ba9964fc44a097106487a9624cd58fb38bc2d48
nss-debugsource-3.79.0-11.el8_6.s390x.rpm
SHA-256: 749fc0cd33d4048d4c2581956a68bd60ddcaf0efdffa5771b4e65e2fd9451ebe
nss-devel-3.79.0-11.el8_6.s390x.rpm
SHA-256: 4ba9cef85621832df7433a24caec09b0860496af42eaffa69dc2e76088b2d4e5
nss-softokn-3.79.0-11.el8_6.s390x.rpm
SHA-256: 8c663ef9f9ac75f1ea63e2cde772eda511096f76b1e5b7a072cf2fbf705ff95e
nss-softokn-debuginfo-3.79.0-11.el8_6.s390x.rpm
SHA-256: 5149866a296851a856dd22238c5424e38b97850763686727f55e3b7e2be3e31b
nss-softokn-devel-3.79.0-11.el8_6.s390x.rpm
SHA-256: c32d88657b57d16741a52e1234c9e3348ad01bbd0a2242edc6f75eaa8d1f85c2
nss-softokn-freebl-3.79.0-11.el8_6.s390x.rpm
SHA-256: 5ce2cab1dfd9edcffccbb4b8aa4c1cea333d22db8801e9c81492596e9bea6713
nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.s390x.rpm
SHA-256: f50663fd0f233354afee0d2551ed4263e6861f543d083b990cf6d864a7ee6017
nss-softokn-freebl-devel-3.79.0-11.el8_6.s390x.rpm
SHA-256: 0e4e9a7dc4c8da42201d2a4096fd2afe908dc803c1bae6d3585a454911cea7bd
nss-sysinit-3.79.0-11.el8_6.s390x.rpm
SHA-256: 4d181b2efbd38c2a3040e1a45b222e9c3c6b344b68c9015e22ebde85362c195b
nss-sysinit-debuginfo-3.79.0-11.el8_6.s390x.rpm
SHA-256: d8af63b9ca6fad25731b33e824ff2f74b3d9303dd87341f84fa343e7448aac88
nss-tools-3.79.0-11.el8_6.s390x.rpm
SHA-256: 06aa98caeca6a457602c10327551e4d95518803bc8401ad8833b6f70a2888406
nss-tools-debuginfo-3.79.0-11.el8_6.s390x.rpm
SHA-256: 305fb04458e8e8bb04ee0d2180a0c559c706a9d86d6f1fd1df8ba109a5bcdc56
nss-util-3.79.0-11.el8_6.s390x.rpm
SHA-256: cd665ed70275e0f531e6a58401c9e22069f8939d3cc0f9430e31297608ce5871
nss-util-debuginfo-3.79.0-11.el8_6.s390x.rpm
SHA-256: 9d26fa2dd7b8591bbe81e39e8051bc413eaf70c02858c29cf1496b64cd874c1f
nss-util-devel-3.79.0-11.el8_6.s390x.rpm
SHA-256: 49c28a9492212cb54497dee581fd3c3d58d07f0590792d501188804acd229c5a
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
nss-3.79.0-11.el8_6.src.rpm
SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a
ppc64le
nss-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: c19a6d166c4970e224e0161bc9418119d0979e7d85c3991683098409c1d00e13
nss-debuginfo-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: a3cb0e2ace9f53581bc3f52f2631625e2287a6064207b54dad109d1b68c6c642
nss-debugsource-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: d39451013527e5a87f2c9d5764153d2cbc1bd65350b44357b2aeaf0177dbd2fc
nss-devel-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: c9d53b973736141e71f8da147dde2c87790a6467fd8abc98cc474ae167ad1e6c
nss-softokn-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: b64114ffbc41db51cac7fd2d3fb418b1d7893fac6349edf6f62841a0d20043a7
nss-softokn-debuginfo-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 31f71d5d76078068404365a5ce10862dd0bf06661c6f09c542e738c051bd3769
nss-softokn-devel-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 4d3cf752c40fec441708a9c1cdeb26572b7c435320cae385b5b786033856fc39
nss-softokn-freebl-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 34d10f7697b687dfc218dabcf2c97177989996843517f09655b945cef813ea3d
nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 1dffc5b4d62fc299b08498d70bca87cc0a7e781f05f0a7fc0c05def7c69b5785
nss-softokn-freebl-devel-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 833f5fc1ddefb96dfa12f13870aedf9e0ca171d51d5e5ac94a769f09b55919fe
nss-sysinit-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 7165a9df9eb847857919269e726e879a97e2666b0e10059009805db448ba278e
nss-sysinit-debuginfo-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 0871354bc6266f65df367a21a3e97701c8ed32b55425a4609fb47c4b41db226b
nss-tools-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: a81d0aa67490c7bf62394850db9cb6bbc04ba65522cbb7c881682d08198e968c
nss-tools-debuginfo-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 82d931ec51b4cb2978780b5a0a24719886a62d68c8f017619018060fad771f96
nss-util-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 2c41a5cee08985d441a1ea2f864715b98a8ab72e269cf0af2e7ead723d8aa12a
nss-util-debuginfo-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: f472675fa0c480521fe805681a7226b736578f8b198839df09271f7a18be1205
nss-util-devel-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 5f8f11c2b831e222c100854886b423ca004cf1ebe90314c4c0175ba9b35a56f3
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
nss-3.79.0-11.el8_6.src.rpm
SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a
x86_64
nss-3.79.0-11.el8_6.i686.rpm
SHA-256: 22698f9b5c6474795d0d1bb4f61b423a96c0bd5f7cca926a5cce0435108aea06
nss-3.79.0-11.el8_6.x86_64.rpm
SHA-256: bdc82d43716a04aed7ee58816af1f97c0068fd27c7221b70e54d85172f9abc7c
nss-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 3bd50b95f12cab7996d9b6057a883449ec43167b1aefb2915c47d7fbfe2cb745
nss-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 7831346743e482adbb39343eabea6b45151bdd65e52ef3c1868f81e8208b0f1c
nss-debugsource-3.79.0-11.el8_6.i686.rpm
SHA-256: 0f8d643cb01f7e02c72b70fbc0415a6617c21592fd084317efb61e7b6ed345a8
nss-debugsource-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 3e74844b1005376ad09d96b5826119b9e6287b9dfcf7b4a510618a95bada9435
nss-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: 2d4de4a8e5f92031c8eb50defe660a1ece8bc42edae222cdcc882fa56506ae2f
nss-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: a15275e70baf60d350b8376b035e35a52e3987a736e471a6c907bf0e03eba143
nss-softokn-3.79.0-11.el8_6.i686.rpm
SHA-256: b7747add0068a9427ab861b3527eae309a12d8872a3a430539b3a9ddc5db1552
nss-softokn-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 15aea95ab0226ff8b3e7666da34feec396572c6f262f428df498e6af0fbcf486
nss-softokn-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 3d74ae8064b7509d63b8f62f88ddad47c3d44154e7904d0de0f508e8ea5d2d25
nss-softokn-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 25d7ce3511880ecb8bf74732da430f082510b461828097ba1a39958081b5177b
nss-softokn-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: 1ea85c9a05969561252b5a5cc05fb7667cdc80c232e358d21e967a9b49d4df7a
nss-softokn-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 7e5e951eb86f0e495ecf2bddbadb7e78e2ac1caffbf560d0c1a66e8c0bb14c81
nss-softokn-freebl-3.79.0-11.el8_6.i686.rpm
SHA-256: 00940e5d342425b977a2ef8ee3528f1c86f84cac555f971b6fed53d17bdd9813
nss-softokn-freebl-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 7f161b3e7e98327a0d7e9000fe75a35d4c4666cec0947e8f5a95c9c9b785e417
nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 9539e03fffc543d9a774cb83442be5bfc1ea0021c5850cdd776464b2efa5c92c
nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: e695589bc8f83e885a6bd62a31fc65c43ee749e0d133aac9ecc08d27cfb5cb12
nss-softokn-freebl-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: 2d148ef1e6318bf4bbe01606033fa4ed3b1b346e37708e93fcccfc507a8bf43c
nss-softokn-freebl-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: c1535bd5e87b6c85bb2238b021fadeda8f9251f63cb278ac2a90cc2732aa0a98
nss-sysinit-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 9dad45bed9b1e178b180b9332598da141e3794f38c9ae1774282ecc2b8f6561e
nss-sysinit-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 668f709ce1792e48fdbc903f17e0e4e06cb84cc3f96e6322eb496c08fd0c50b4
nss-sysinit-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: acd338329a1f9f416ced9dd39785c41b9a28a622492e527ddedc8ef589085f2c
nss-tools-3.79.0-11.el8_6.x86_64.rpm
SHA-256: f4c4ec1b9e90a1a8cb76e49daa1a4af0bd1c3c81cf2961a35e6a8b1c2aff28d3
nss-tools-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: b61de8b4e0ef5e07d5f75b7dd59d2de19469d27ad97349fd4e51cda102541f64
nss-tools-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: f5afeb6046d2fb458bdca2e5b17385568aacba567257c896784f9062c969ef22
nss-util-3.79.0-11.el8_6.i686.rpm
SHA-256: ddb56f7b5d8130dfb2a0283d199083543291dd1f9370fcfa7fb11492f053b0fb
nss-util-3.79.0-11.el8_6.x86_64.rpm
SHA-256: d6d5145d43e12e86af66da9e77a36162c4bf9a6c705c25be9f40a67e540b6c37
nss-util-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: d15ded3c9e2eb9757eb26007755275488d76fd0d148c0909e0cf50fb1d1cb6b3
nss-util-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: c43869f3261dc2023c54a1fa5f89ac761e9cd854115d2be47385ef7a3729146c
nss-util-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: efcb78b913c7e2f9b9f8c3757b8c3d8d136cf70593772455bc28e14ce8bebfa6
nss-util-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 08449870c9e59d83f666b45cdf4eae8d1a895adb1a3147dbd511575a1247afcc
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
nss-3.79.0-11.el8_6.src.rpm
SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a
aarch64
nss-3.79.0-11.el8_6.aarch64.rpm
SHA-256: 8c4e0c22299d9c38b1a459d0fe6c793a539cb92ae48f2f1f86659875ffbfddfd
nss-debuginfo-3.79.0-11.el8_6.aarch64.rpm
SHA-256: c6cb7c54b0224983690ceb48335b47f0bc6654bb7c1c236dde0a69522b63707b
nss-debugsource-3.79.0-11.el8_6.aarch64.rpm
SHA-256: 833781faf36b4b3b9ef17fea239ef1955a07e7003d181f52f28f9e06c3f3f67a
nss-devel-3.79.0-11.el8_6.aarch64.rpm
SHA-256: 9f6d83a91b579e45fc2c8106dff14bf7b550370357bb7f8be13188e03ea97191
nss-softokn-3.79.0-11.el8_6.aarch64.rpm
SHA-256: 3eb29f51d300068ae9086377d8ceb4b67f23d8909c5a8bb013ce9132a964cf46
nss-softokn-debuginfo-3.79.0-11.el8_6.aarch64.rpm
SHA-256: cc6aa6822f78a5451090df42a1308ffb7de3c80509448293ca2cece99c0a01d4
nss-softokn-devel-3.79.0-11.el8_6.aarch64.rpm
SHA-256: 6c802eaed1e6e72d6231465225542645adb11542c02208386fd1ee847245e642
nss-softokn-freebl-3.79.0-11.el8_6.aarch64.rpm
SHA-256: 649e3db398e65f958524c3bdd2418c810d6bebe1f379ec279496940fc7959740
nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.aarch64.rpm
SHA-256: 914ac83992ac6fc03f5063136aadf927041dd9b8e97aa0e551120f26fba07b10
nss-softokn-freebl-devel-3.79.0-11.el8_6.aarch64.rpm
SHA-256: 419642e14cdf65c0702b14832703e6b943d9949299d577c1fad2cd37841fa0c3
nss-sysinit-3.79.0-11.el8_6.aarch64.rpm
SHA-256: b56a53bd14a13fea45b7f10da1ca7996f31877602b49ee7dde46f87ad5f8879a
nss-sysinit-debuginfo-3.79.0-11.el8_6.aarch64.rpm
SHA-256: 5d408e57198bae9d78a08f958a4ed18ffa911cb6587e280e81710908cf7db3e5
nss-tools-3.79.0-11.el8_6.aarch64.rpm
SHA-256: 37fb41bbbf65140c9f086f6419634fc0daa2c73274230a71e483485613f5c940
nss-tools-debuginfo-3.79.0-11.el8_6.aarch64.rpm
SHA-256: 0c4ae05bb5dba3f7cda75f6317abefc14c1dbe98ce08956c395539790c694a1d
nss-util-3.79.0-11.el8_6.aarch64.rpm
SHA-256: 35cbec6b6c147fd22192af446639ca0b10623ab20a7aef5407656adf17aa0708
nss-util-debuginfo-3.79.0-11.el8_6.aarch64.rpm
SHA-256: 1d157047fe0bce397a9b4647fd6c35e0bc3a2e912fba1a47c517a1c4c1429c60
nss-util-devel-3.79.0-11.el8_6.aarch64.rpm
SHA-256: f764cf38c60aa1ec83a4c39a980c9cbf63724eac70a3faec630c675adf185aea
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
nss-3.79.0-11.el8_6.src.rpm
SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a
ppc64le
nss-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: c19a6d166c4970e224e0161bc9418119d0979e7d85c3991683098409c1d00e13
nss-debuginfo-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: a3cb0e2ace9f53581bc3f52f2631625e2287a6064207b54dad109d1b68c6c642
nss-debugsource-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: d39451013527e5a87f2c9d5764153d2cbc1bd65350b44357b2aeaf0177dbd2fc
nss-devel-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: c9d53b973736141e71f8da147dde2c87790a6467fd8abc98cc474ae167ad1e6c
nss-softokn-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: b64114ffbc41db51cac7fd2d3fb418b1d7893fac6349edf6f62841a0d20043a7
nss-softokn-debuginfo-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 31f71d5d76078068404365a5ce10862dd0bf06661c6f09c542e738c051bd3769
nss-softokn-devel-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 4d3cf752c40fec441708a9c1cdeb26572b7c435320cae385b5b786033856fc39
nss-softokn-freebl-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 34d10f7697b687dfc218dabcf2c97177989996843517f09655b945cef813ea3d
nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 1dffc5b4d62fc299b08498d70bca87cc0a7e781f05f0a7fc0c05def7c69b5785
nss-softokn-freebl-devel-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 833f5fc1ddefb96dfa12f13870aedf9e0ca171d51d5e5ac94a769f09b55919fe
nss-sysinit-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 7165a9df9eb847857919269e726e879a97e2666b0e10059009805db448ba278e
nss-sysinit-debuginfo-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 0871354bc6266f65df367a21a3e97701c8ed32b55425a4609fb47c4b41db226b
nss-tools-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: a81d0aa67490c7bf62394850db9cb6bbc04ba65522cbb7c881682d08198e968c
nss-tools-debuginfo-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 82d931ec51b4cb2978780b5a0a24719886a62d68c8f017619018060fad771f96
nss-util-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 2c41a5cee08985d441a1ea2f864715b98a8ab72e269cf0af2e7ead723d8aa12a
nss-util-debuginfo-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: f472675fa0c480521fe805681a7226b736578f8b198839df09271f7a18be1205
nss-util-devel-3.79.0-11.el8_6.ppc64le.rpm
SHA-256: 5f8f11c2b831e222c100854886b423ca004cf1ebe90314c4c0175ba9b35a56f3
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
nss-3.79.0-11.el8_6.src.rpm
SHA-256: c7737de2ceab834da091e25fec5a9c2c423d2bb059fa71e254f7773c4448f34a
x86_64
nss-3.79.0-11.el8_6.i686.rpm
SHA-256: 22698f9b5c6474795d0d1bb4f61b423a96c0bd5f7cca926a5cce0435108aea06
nss-3.79.0-11.el8_6.x86_64.rpm
SHA-256: bdc82d43716a04aed7ee58816af1f97c0068fd27c7221b70e54d85172f9abc7c
nss-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 3bd50b95f12cab7996d9b6057a883449ec43167b1aefb2915c47d7fbfe2cb745
nss-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 7831346743e482adbb39343eabea6b45151bdd65e52ef3c1868f81e8208b0f1c
nss-debugsource-3.79.0-11.el8_6.i686.rpm
SHA-256: 0f8d643cb01f7e02c72b70fbc0415a6617c21592fd084317efb61e7b6ed345a8
nss-debugsource-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 3e74844b1005376ad09d96b5826119b9e6287b9dfcf7b4a510618a95bada9435
nss-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: 2d4de4a8e5f92031c8eb50defe660a1ece8bc42edae222cdcc882fa56506ae2f
nss-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: a15275e70baf60d350b8376b035e35a52e3987a736e471a6c907bf0e03eba143
nss-softokn-3.79.0-11.el8_6.i686.rpm
SHA-256: b7747add0068a9427ab861b3527eae309a12d8872a3a430539b3a9ddc5db1552
nss-softokn-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 15aea95ab0226ff8b3e7666da34feec396572c6f262f428df498e6af0fbcf486
nss-softokn-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 3d74ae8064b7509d63b8f62f88ddad47c3d44154e7904d0de0f508e8ea5d2d25
nss-softokn-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 25d7ce3511880ecb8bf74732da430f082510b461828097ba1a39958081b5177b
nss-softokn-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: 1ea85c9a05969561252b5a5cc05fb7667cdc80c232e358d21e967a9b49d4df7a
nss-softokn-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 7e5e951eb86f0e495ecf2bddbadb7e78e2ac1caffbf560d0c1a66e8c0bb14c81
nss-softokn-freebl-3.79.0-11.el8_6.i686.rpm
SHA-256: 00940e5d342425b977a2ef8ee3528f1c86f84cac555f971b6fed53d17bdd9813
nss-softokn-freebl-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 7f161b3e7e98327a0d7e9000fe75a35d4c4666cec0947e8f5a95c9c9b785e417
nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 9539e03fffc543d9a774cb83442be5bfc1ea0021c5850cdd776464b2efa5c92c
nss-softokn-freebl-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: e695589bc8f83e885a6bd62a31fc65c43ee749e0d133aac9ecc08d27cfb5cb12
nss-softokn-freebl-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: 2d148ef1e6318bf4bbe01606033fa4ed3b1b346e37708e93fcccfc507a8bf43c
nss-softokn-freebl-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: c1535bd5e87b6c85bb2238b021fadeda8f9251f63cb278ac2a90cc2732aa0a98
nss-sysinit-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 9dad45bed9b1e178b180b9332598da141e3794f38c9ae1774282ecc2b8f6561e
nss-sysinit-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: 668f709ce1792e48fdbc903f17e0e4e06cb84cc3f96e6322eb496c08fd0c50b4
nss-sysinit-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: acd338329a1f9f416ced9dd39785c41b9a28a622492e527ddedc8ef589085f2c
nss-tools-3.79.0-11.el8_6.x86_64.rpm
SHA-256: f4c4ec1b9e90a1a8cb76e49daa1a4af0bd1c3c81cf2961a35e6a8b1c2aff28d3
nss-tools-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: b61de8b4e0ef5e07d5f75b7dd59d2de19469d27ad97349fd4e51cda102541f64
nss-tools-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: f5afeb6046d2fb458bdca2e5b17385568aacba567257c896784f9062c969ef22
nss-util-3.79.0-11.el8_6.i686.rpm
SHA-256: ddb56f7b5d8130dfb2a0283d199083543291dd1f9370fcfa7fb11492f053b0fb
nss-util-3.79.0-11.el8_6.x86_64.rpm
SHA-256: d6d5145d43e12e86af66da9e77a36162c4bf9a6c705c25be9f40a67e540b6c37
nss-util-debuginfo-3.79.0-11.el8_6.i686.rpm
SHA-256: d15ded3c9e2eb9757eb26007755275488d76fd0d148c0909e0cf50fb1d1cb6b3
nss-util-debuginfo-3.79.0-11.el8_6.x86_64.rpm
SHA-256: c43869f3261dc2023c54a1fa5f89ac761e9cd854115d2be47385ef7a3729146c
nss-util-devel-3.79.0-11.el8_6.i686.rpm
SHA-256: efcb78b913c7e2f9b9f8c3757b8c3d8d136cf70593772455bc28e14ce8bebfa6
nss-util-devel-3.79.0-11.el8_6.x86_64.rpm
SHA-256: 08449870c9e59d83f666b45cdf4eae8d1a895adb1a3147dbd511575a1247afcc
Related news
OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...
Multicluster Engine for Kubernetes 2.1.6 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25881: A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.
Red Hat Security Advisory 2023-1677-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow and integer overflow vulnerabilities.
An update is now available for Logging Subsystem for Red Hat OpenShift - 5.5.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large...
An update for firefox is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0767: The Mozilla Foundation Security Advisory describes this flaw as: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. * CVE-2023-25751: A flaw was found in Mozilla. The Mozilla Foundation Security Advisory ...
Red Hat Security Advisory 2023-1252-01 - Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
An update for nss is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0767: The Mozilla Foundation Security Advisory describes this flaw as: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled.
Ubuntu Security Notice 5892-1 - It was discovered that NSS incorrectly handled client authentication without a user certificate in the database. A remote attacker could possibly use this issue to cause a NSS client to crash, resulting in a denial of service. This issue only affected Ubuntu 22.10. Christian Holler discovered that NSS incorrectly handled certain PKCS 12 certificated bundles. A remote attacker could use this issue to cause NSS to crash, leading to a denial of service, or possibly execute arbitrary code.
Ubuntu Security Notice 5880-1 - Christian Holler discovered that Firefox did not properly manage memory when using PKCS 12 Safe Bag attributes. An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes. Johan Carlsson discovered that Firefox did not properly manage child iframe's unredacted URI when using Content-Security-Policy-Report-Only header. An attacker could potentially exploits this to obtain sensitive information.
Red Hat Security Advisory 2023-0809-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-0805-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-0808-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-0811-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-0806-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Issues addressed include a use-after-free vulnerability.
An update for firefox is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0767: The Mozilla Foundation Security Advisory describes this flaw as: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. * CVE-2023-25728: The Mozilla Foundation Security Advisory describes this flaw as: The `Content-Se...