CentOS Errata and Security Advisory CESA-2015:1664
Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.
It was found that NSS permitted skipping of the ServerKeyExchange packet during a handshake involving ECDHE (Elliptic Curve Diffie-Hellman key Exchange). A remote attacker could use this flaw to bypass the forward-secrecy of a TLS/SSL connection. (CVE-2015-2721)
A flaw was found in the way NSS verified certain ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. Under certain conditions, an attacker could use this flaw to conduct signature forgery attacks. (CVE-2015-2730)
Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Karthikeyan Bhargavan as the original reporter of CVE-2015-2721, and Watson Ladd as the original reporter of CVE-2015-2730.
The nss packages have been upgraded to upstream version 3.19.1, which provides a number of bug fixes and enhancements over the previous version.
All nss users are advised to upgrade to these updated packages, which correct these issues.
Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2015-August/033381.html
Affected packages: nss nss-devel nss-pkcs11-devel nss-tools
Upstream details at: https://rhn.redhat.com/errata/RHSA-2015-1664.html