Amazon Linux 1 Security Advisory: ALAS-2013-217
Advisory Release Date: 2013-08-07 21:23 Pacific
Advisory Updated Date: 2014-09-15 23:20 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
It was discovered that NSS leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites were used. A remote attacker could possibly use this flaw to retrieve plain text from the encrypted packets by using a TLS/SSL or DTLS server as a padding oracle. (CVE-2013-1620)
An out-of-bounds memory read flaw was found in the way NSS decoded certain certificates. If an application using NSS decoded a malformed certificate, it could cause the application to crash. (CVE-2013-0791)
Affected Packages:
nss
Issue Correction:
Run yum update nss to update your system.
i686:
nss-3.14.3-4.29.amzn1.i686
nss-tools-3.14.3-4.29.amzn1.i686
nss-devel-3.14.3-4.29.amzn1.i686
nss-debuginfo-3.14.3-4.29.amzn1.i686
nss-sysinit-3.14.3-4.29.amzn1.i686
nss-pkcs11-devel-3.14.3-4.29.amzn1.i686
src:
nss-3.14.3-4.29.amzn1.src
x86_64:
nss-debuginfo-3.14.3-4.29.amzn1.x86_64
nss-sysinit-3.14.3-4.29.amzn1.x86_64
nss-3.14.3-4.29.amzn1.x86_64
nss-devel-3.14.3-4.29.amzn1.x86_64
nss-pkcs11-devel-3.14.3-4.29.amzn1.x86_64
nss-tools-3.14.3-4.29.amzn1.x86_64