Linux @ CERN

CERN > IT > Linux

CentOS 7 - Updates for x86_64: system environment/base: nss-sysinit

nss-sysinit - System NSS Initialization

Website: http://www.mozilla.org/projects/security/pki/nss/
License: MPLv2.0
Vendor: CentOS
Description:
Default Operating System module that manages applications loading
NSS globally on the system. This module loads the system defined
PKCS #11 modules for NSS and chains with other NSS modules to load
any system or user configured modules.

Packages

nss-sysinit-3.28.4-12.el7_4.x86_64 [59 KiB] Changelog by Daiki Ueno (2017-08-04):
- Backport patch to simplify transcript calculation for CertificateVerify
nss-sysinit-3.28.4-11.el7_4.x86_64 [59 KiB] Changelog by Daiki Ueno (2017-07-14):
- Rebuild to get correct release suffix (.el7 -> .el7_4)
nss-sysinit-3.28.4-8.el7.x86_64 [59 KiB] Changelog by Kai Engert (2017-05-05):
- Include CKBI 2.14 and updated CA constraints from NSS 3.28.5
nss-sysinit-3.28.4-1.2.el7_3.x86_64 [58 KiB] Changelog by Kai Engert (2017-05-16):
- Include CKBI 2.14 and updated CA constraints from NSS 3.28.5
nss-sysinit-3.28.4-1.0.el7_3.x86_64 [58 KiB] Changelog by Daiki Ueno (2017-04-07):
- Rebase to NSS 3.28.4
nss-sysinit-3.28.2-1.6.el7_3.x86_64 [58 KiB] Changelog by Daiki Ueno (2017-02-20):
- Restore ssl-server-min-key-sizes.patch
- Disable TLS_ECDHE_{RSA,ECDSA}_WITH_AES_128_CBC_SHA256 by default
- Enable 4 AES_256_GCM_SHA384 ciphersuites, enabled by the downstream
  patch in the previous release
- Fix crash with tstclnt -W
nss-sysinit-3.21.3-2.el7_3.x86_64 [56 KiB] Changelog by Kai Engert (2016-11-08):
- Mozilla #1314604 / Red Hat CVE-2016-8635
nss-sysinit-3.21.0-17.el7.x86_64 [55 KiB] Changelog by Kai Engert (2016-06-30):
- remove additional false duplicates from sha384 downstream patches
nss-sysinit-3.21.0-9.el7_2.x86_64 [54 KiB] Changelog by Kai Engert (2016-04-15):
- Rebuild to require the latest nss-util build and nss-softokn build.
nss-sysinit-3.19.1-19.el7_2.x86_64 [53 KiB] Changelog by Elio Maldonado (2015-12-15):
- Prevent TLS 1.2 Transcript Collision attacks against MD5 in key exchange protocol
- Resolves: Bug 1289883
nss-sysinit-3.19.1-18.el7.cern.x86_64 [52 KiB] Changelog by Kai Engert (2015-10-21):
- Rebuild against updated NSPR
nss-sysinit-3.19.1-18.el7.cern.i686 [52 KiB] Changelog by Kai Engert (2015-10-21):
- Rebuild against updated NSPR
nss-sysinit-3.19.1-18.el7.x86_64 [53 KiB] Changelog by Kai Engert (2015-10-21):
- Rebuild against updated NSPR
nss-sysinit-3.19.1-7.el7_1.2.x86_64 [51 KiB] Changelog by Elio Maldonado (2015-10-21):
- Rebuild against updated NSPR
nss-sysinit-3.19.1-5.el7_1.x86_64 [51 KiB] Changelog by Kai Engert (2015-06-29):
- Incremental patches to fix SSL/TLS test suite execution,
  fix the earlier SHA384 patch, and inform clients to use SHA384 with
  certificate_verify if required by NSS.
nss-sysinit-3.19.1-3.el7_1.x86_64 [51 KiB] Changelog by Elio Maldonado (2015-06-10):
- Reenable a patch that had been mistakenly disabled
- Resolves: Bug 1224451
nss-sysinit-3.18.0-2.2.el7_1.x86_64 [50 KiB] Changelog by Kai Engert (2015-04-28):
- On RHEL 7.1 keep the TLS version defaults unchanged.

Listing created by repoview