Medium: nss

2018-10-23T23:53:00
ID ALAS-2018-1095
Type amazon
Reporter Amazon
Modified 2018-10-23T23:53:00

Description

Issue Overview:

A flaw was found in the way NSS responded to an SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. A man-in-the-middle attacker could use this flaw in a passive replay attack.(CVE-2018-12384 __)

Affected Packages:

nss

Issue Correction:
Run yum update nss to update your system.

New Packages:

i686:  
    nss-devel-3.36.0-5.82.amzn1.i686  
    nss-sysinit-3.36.0-5.82.amzn1.i686  
    nss-debuginfo-3.36.0-5.82.amzn1.i686  
    nss-3.36.0-5.82.amzn1.i686  
    nss-tools-3.36.0-5.82.amzn1.i686  
    nss-pkcs11-devel-3.36.0-5.82.amzn1.i686

src:  
    nss-3.36.0-5.82.amzn1.src

x86_64:  
    nss-debuginfo-3.36.0-5.82.amzn1.x86_64  
    nss-3.36.0-5.82.amzn1.x86_64  
    nss-sysinit-3.36.0-5.82.amzn1.x86_64  
    nss-tools-3.36.0-5.82.amzn1.x86_64  
    nss-devel-3.36.0-5.82.amzn1.x86_64  
    nss-pkcs11-devel-3.36.0-5.82.amzn1.x86_64