Update for NSS and NSPR libraries to fix TLS/SSL session renegotiation flaw
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | man-in-the-middle attack in openssl | 18 Nov 200909:50 | – | suse |
![]() | Fedora Update for nss FEDORA-2010-3905 | 31 Mar 201000:00 | – | openvas |
![]() | CentOS Update for openssl097a CESA-2010:0164 centos5 i386 | 9 Aug 201100:00 | – | openvas |
![]() | FreeBSD Security Advisory (FreeBSD-SA-09:15.ssl.asc) | 10 Dec 200900:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-990-1) | 27 Sep 201000:00 | – | openvas |
![]() | Fedora Core 11 FEDORA-2009-12305 (tomcat-native) | 30 Dec 200900:00 | – | openvas |
![]() | Mandriva Update for nss MDVSA-2010:069 (nss) | 9 Apr 201000:00 | – | openvas |
![]() | CentOS Update for nspr CESA-2010:0165 centos5 i386 | 9 Aug 201100:00 | – | openvas |
![]() | SLES10: Security update for OpenSSL | 17 Nov 200900:00 | – | openvas |
![]() | Fedora Core 11 FEDORA-2009-12305 (tomcat-native) | 30 Dec 200900:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | ppc64 | nspr | 4.8.4-1.el5_4 | nspr-4.8.4-1.el5_4.ppc64.rpm |
RedHat | 5 | s390x | nspr-devel | 4.8.4-1.el5_4 | nspr-devel-4.8.4-1.el5_4.s390x.rpm |
RedHat | 4 | ia64 | nss | 3.12.6-1.el4_8 | nss-3.12.6-1.el4_8.ia64.rpm |
RedHat | 5 | ppc | nss-pkcs11-devel | 3.12.6-1.el5_4 | nss-pkcs11-devel-3.12.6-1.el5_4.ppc.rpm |
RedHat | 4 | s390x | nspr-devel | 4.8.4-1.1.el4_8 | nspr-devel-4.8.4-1.1.el4_8.s390x.rpm |
RedHat | 5 | src | nspr | 4.8.4-1.el5_4 | nspr-4.8.4-1.el5_4.src.rpm |
RedHat | 5 | i386 | nspr | 4.8.4-1.el5_4 | nspr-4.8.4-1.el5_4.i386.rpm |
RedHat | 5 | s390 | nss | 3.12.6-1.el5_4 | nss-3.12.6-1.el5_4.s390.rpm |
RedHat | 4 | ia64 | nss-devel | 3.12.6-1.el4_8 | nss-devel-3.12.6-1.el4_8.ia64.rpm |
RedHat | 5 | s390x | nss | 3.12.6-1.el5_4 | nss-3.12.6-1.el5_4.s390x.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo