You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa nss

Sigurnosni nedostatak programskog paketa nss

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2020-f29254bd5e
2020-11-04 03:00:47.398608
——————————————————————————–

Name : nss
Product : Fedora 33
Version : 3.58.0
Release : 3.fc33
URL : http://www.mozilla.org/projects/security/pki/nss/
Summary : Network Security Services
Description :
Network Security Services (NSS) is a set of libraries designed to
support cross-platform development of security-enabled client and
server applications. Applications built with NSS can support SSL v2
and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509
v3 certificates, and other security standards.

——————————————————————————–
Update Information:

Updates the nss package to upstream NSS 3.58 respectively. For details about
new functionality and a list of bugs fixed in this release please see the
upstream release notes – https://developer.mozilla.org/en-
US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes
——————————————————————————–
ChangeLog:

* Mon Oct 26 2020 Daiki Ueno <dueno@redhat.com> – 3.58.0-3
– Revert the last change, always tolerate the first CCS in TLS 1.3
* Thu Oct 22 2020 Daiki Ueno <dueno@redhat.com> – 3.58.0-2
– Enable TLS 1.3 middlebox compatibility mode by default
* Tue Oct 20 2020 Daiki Ueno <dueno@redhat.com> – 3.58.0-1
– Update to NSS 3.58
——————————————————————————–
References:

[ 1 ] Bug #1887319 – CVE-2020-25648 nss: TLS 1.3 CCS flood remote DoS Attack
https://bugzilla.redhat.com/show_bug.cgi?id=1887319
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-f29254bd5e’ at the command
line. For more information, refer to the dnf documentation available at
https://protect2.fireeye.com/v1/url?k=16fcbdbe-4960a7a0-16fb2072-000babd90757-5ffb9e151558aeb3&q=1&e=1a9a741d-3924-4007-a6fa-ca00b36d4930&u=http%3A%2F%2Fdnf.readthedocs.io%2Fen%2Flatest%2Fcommand_ref.html%23upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorBruno Varga
Cert idNCERT-REF-2020-11-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa libytnef

Otkriveni su sigurnosni nedostaci programske biblioteke libytnef za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja. Savjetuje...

Close