Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 919174 - Rebase to nss-util 3.14.3 as part of the fix for the lucky-13 issue [rhel-6.5]
Rebase to nss-util 3.14.3 as part of the fix for the lucky-13 issue [rhel-6.5]
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: nss-util (Show other bugs)
6.5
Unspecified Unspecified
high Severity medium
: rc
: ---
Assigned To: Elio Maldonado Batiz
Hubert Kario
: Rebase, ZStream
Depends On: 919180
Blocks: 918950 919172 927171
  Show dependency treegraph
 
Reported: 2013-03-07 13:57 EST by Elio Maldonado Batiz
Modified: 2013-11-21 01:12 EST (History)
5 users (show)

See Also:
Fixed In Version: nss-util-3.14.3-1.el6
Doc Type: Rebase: Bug Fixes and Enhancements
Doc Text:
This advisory rebases the nss-util package along with nss to version 3.15.1. This update addressess CVE-2013-1620 - Non-constant time CBC decoding results in padding oracle, aka Lucky Thirteen attack. Bug 822365
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-11-21 01:12:22 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2013:1558 normal SHIPPED_LIVE nss and nspr bug fix and enhancement update 2013-11-20 19:40:48 EST

  None (edit)
Description Elio Maldonado Batiz 2013-03-07 13:57:57 EST
Description of problem: In order to fix Bug 918950 - [RFE][RHEL6] Rebase to nss-3.14.3 to fix the lucky-13 issue, we need to rebase nss-util as well to match the nss version.
Comment 7 errata-xmlrpc 2013-11-21 01:12:22 EST
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2013-1558.html

Note You need to log in before you can comment on or make changes to this bug.