---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora update for nspr and nss SECUNIA ADVISORY ID: SA24277 VERIFY ADVISORY: http://secunia.com/advisories/24277/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 6 http://secunia.com/product/12487/ Fedora Core 5 http://secunia.com/product/8808/ DESCRIPTION: Fedora has issued an update for nspr and nss. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. For more information: SA24253 SOLUTION: Apply updated packages. -- Fedora Core 5 -- 368c7aa782b30694b2d55b7f73d6edf83a8b60da SRPMS/nss-3.11.5-0.5.0.fc5.src.rpm 368c7aa782b30694b2d55b7f73d6edf83a8b60da noarch/nss-3.11.5-0.5.0.fc5.src.rpm 897f65facbc63f478e73337d532432396e0bb852 ppc/debug/nss-debuginfo-3.11.5-0.5.0.fc5.ppc.rpm 6c45d3c3519caa2d237f4838dea38ad9de81d28f ppc/nss-3.11.5-0.5.0.fc5.ppc.rpm 415a9e58dcd370bd82d777642a54338283763aec ppc/nss-devel-3.11.5-0.5.0.fc5.ppc.rpm b74e0f0b91ae52ba282c707bd3ff04d8c8b48b1e ppc/nss-tools-3.11.5-0.5.0.fc5.ppc.rpm dbe829bad2636624e9c9c6237ecfbe5255e33889 ppc/nss-pkcs11-devel-3.11.5-0.5.0.fc5.ppc.rpm 3ff476a3a3a98a08b948404d145238de413b1213 x86_64/nss-3.11.5-0.5.0.fc5.x86_64.rpm dbc45436ddae3537b1b9340ea4cf9b75a45f7126 x86_64/nss-devel-3.11.5-0.5.0.fc5.x86_64.rpm d13521df9c751045678fae046f9994978aae9eca x86_64/nss-tools-3.11.5-0.5.0.fc5.x86_64.rpm 2204c661866144da5c908277e30496ddc424eda1 x86_64/debug/nss-debuginfo-3.11.5-0.5.0.fc5.x86_64.rpm 346896338c3b29bcada0bcd50f793f54799bd478 x86_64/nss-pkcs11-devel-3.11.5-0.5.0.fc5.x86_64.rpm e4c229680358be487dd31bd40fe37683e0964cc2 i386/nss-tools-3.11.5-0.5.0.fc5.i386.rpm 20b97cb01b4e6d0ad3fa9d9b48d1d091ccefdb45 i386/nss-devel-3.11.5-0.5.0.fc5.i386.rpm e1e91a0800d363327c5523c75b3e2a77d33d6085 i386/debug/nss-debuginfo-3.11.5-0.5.0.fc5.i386.rpm b2d598386f50b51e5d6641c146ea4b5e14ff52d0 i386/nss-3.11.5-0.5.0.fc5.i386.rpm 43fb0c25d819a024d6be9a363dfda60b93dd1db4 i386/nss-pkcs11-devel-3.11.5-0.5.0.fc5.i386.rpm a5b919dc86a7c830c90702ded69bc26aaa37a3d6 SRPMS/nspr-4.6.5-0.5.0.fc5.src.rpm a5b919dc86a7c830c90702ded69bc26aaa37a3d6 noarch/nspr-4.6.5-0.5.0.fc5.src.rpm 546d4649656f5e9b86a0d6226048986700526364 ppc/debug/nspr-debuginfo-4.6.5-0.5.0.fc5.ppc.rpm f78719616e303fa8ea2c6bf89d866dfd09b5d06b ppc/nspr-4.6.5-0.5.0.fc5.ppc.rpm dcc0e134845945a5c4590a4c89ec0149abc29065 ppc/nspr-devel-4.6.5-0.5.0.fc5.ppc.rpm 82733b2ee3d3759984d92e8345c9bd286e54ded3 x86_64/nspr-devel-4.6.5-0.5.0.fc5.x86_64.rpm 94f6e4e79fc36ae27218599fd7ec21d4e91e12e4 x86_64/nspr-4.6.5-0.5.0.fc5.x86_64.rpm 60863070f2c587034fc2ae8a8d0540fe6e5883b3 x86_64/debug/nspr-debuginfo-4.6.5-0.5.0.fc5.x86_64.rpm c79172cdc360174c3308f637ebc390562834b73a i386/nspr-4.6.5-0.5.0.fc5.i386.rpm ee2490cc1de564813e76349e6a3f1c3c28751658 i386/debug/nspr-debuginfo-4.6.5-0.5.0.fc5.i386.rpm 7ca65f3597c5c2d26cc3ecd12760227574fc941a i386/nspr-devel-4.6.5-0.5.0.fc5.i386.rpm -- Fedora Core 6 -- e08dc5803b83b36c224987c2a5039a1a9c3adb7c SRPMS/nss-3.11.5-0.6.0.fc6.src.rpm e08dc5803b83b36c224987c2a5039a1a9c3adb7c noarch/nss-3.11.5-0.6.0.fc6.src.rpm 8a5bae5ea58c3592a0ebd75598e5496f01335922 ppc/nss-3.11.5-0.6.0.fc6.ppc.rpm f4ac5629aa41ea0678720b33fb792f28cd93cc69 ppc/nss-pkcs11-devel-3.11.5-0.6.0.fc6.ppc.rpm 5dcc068be8b9a2c517cc9a7b20ccdce1d3142c9e ppc/debug/nss-debuginfo-3.11.5-0.6.0.fc6.ppc.rpm f91a3c60a82b383e17f2c1efda0756b363779241 ppc/nss-tools-3.11.5-0.6.0.fc6.ppc.rpm 4b306b84f687caa3462fcd89291e7aa8f12c05d9 ppc/nss-devel-3.11.5-0.6.0.fc6.ppc.rpm 99ff96d8561b542726b2104d704a679a9ef7be08 x86_64/debug/nss-debuginfo-3.11.5-0.6.0.fc6.x86_64.rpm 33997287945a474632fe404231e7a06185f626f9 x86_64/nss-pkcs11-devel-3.11.5-0.6.0.fc6.x86_64.rpm 1a22450f4cd51f282126cd030c023c07c058999a x86_64/nss-3.11.5-0.6.0.fc6.x86_64.rpm ae7d34d969e47f444cd7e8043f652e29b148f511 x86_64/nss-tools-3.11.5-0.6.0.fc6.x86_64.rpm 3c44c678d0670276c98cf77c6777377db295f571 x86_64/nss-devel-3.11.5-0.6.0.fc6.x86_64.rpm 5f75c3672ac90bc48632f0d697bbc175c1e3e665 i386/nss-tools-3.11.5-0.6.0.fc6.i386.rpm 8a180e3cf3dee9d19ce6e0a9d6d7cf121722cead i386/nss-3.11.5-0.6.0.fc6.i386.rpm cfef7d660bf5ae51305dbb285e1d044c4a180a20 i386/nss-devel-3.11.5-0.6.0.fc6.i386.rpm 240e4d47acbb5f5be44f6799718fd6a291bbaf00 i386/debug/nss-debuginfo-3.11.5-0.6.0.fc6.i386.rpm 3c6753faac9a66a30028e056005f8a7232a6fcee i386/nss-pkcs11-devel-3.11.5-0.6.0.fc6.i386.rpm 9f59ab433f57f7052d6ab2c9f68b7a4c04757064 SRPMS/nspr-4.6.5-0.6.0.fc6.src.rpm 9f59ab433f57f7052d6ab2c9f68b7a4c04757064 noarch/nspr-4.6.5-0.6.0.fc6.src.rpm a54af3cd02b1115d883d193475128e048e015f97 ppc/nspr-4.6.5-0.6.0.fc6.ppc.rpm d5ec408496920ccb8f2fc8d758ad590e45137a1e ppc/debug/nspr-debuginfo-4.6.5-0.6.0.fc6.ppc.rpm d6405fe8482923f4a9b8dde610d50f9aeb99cf05 ppc/nspr-devel-4.6.5-0.6.0.fc6.ppc.rpm e30637814be3c35fc18c6aa294bd6ab2a824882b x86_64/nspr-devel-4.6.5-0.6.0.fc6.x86_64.rpm fcd45fcbe62f9c60aeb9f0330d20d37a1add9180 x86_64/nspr-4.6.5-0.6.0.fc6.x86_64.rpm 98fc17685219014f392e2716200517c15a6202c4 x86_64/debug/nspr-debuginfo-4.6.5-0.6.0.fc6.x86_64.rpm 4d3367d841aff0094a84e8d3b61bbde051916556 i386/nspr-4.6.5-0.6.0.fc6.i386.rpm bbde215f04551371db4f9bf29dac24aaacda1788 i386/debug/nspr-debuginfo-4.6.5-0.6.0.fc6.i386.rpm a275dfd9fafb3db3a60607f9b9724f42a82f7e40 i386/nspr-devel-4.6.5-0.6.0.fc6.i386.rpm ORIGINAL ADVISORY: http://fedoranews.org/cms/node/2709 http://fedoranews.org/cms/node/2710 http://fedoranews.org/cms/node/2711 http://fedoranews.org/cms/node/2712 OTHER REFERENCES: SA24253: http://secunia.com/advisories/24253/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------