OBSOLETE Patch-ID# 115924-10


Download this patch from My Oracle Support

Your use of the firmware, software and any other materials contained in this update is subject to My Oracle Support Terms of Use, which may be viewed at My Oracle Support.
For further information on patching best practices and resources, please see the following links:
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.

Keywords: nspr nss security jss
Synopsis: Obsoleted by: 117722-10 SunOS 5.8: NSPR 4.1.6 / NSS 3.3.11 / JSS 3.1.4
Date: Aug/09/2004


Install Requirements: NA

Solaris Release: 8

SunOS Release: 5.8

Unbundled Product: NSS/JSS/NSPR

Unbundled Release: 3.3.11

Xref:

Topic:

Relevant Architectures: sparc

Bugs fixed with this patch:

Sun CR # Bug #
487728711990727
488595211989419
488646411989221
488831111987984
490356411986454
493353511980004
494508911977657
496174312079426
497284011974325
499152911972428
500456312086778
500903112081633
501151711969558
501620911949244
501649811968685
504485712080726
506968312080574
508343712090496


Changes incorporated in this version: 5083437

Patches accumulated and obsoleted by this patch:

Patches which conflict with this patch:

Patches required with this patch:

Obsoleted by: 117722-10

Files included with this patch:

/usr/lib/mps/secv1/64
/usr/lib/mps/secv1/cpu/sparcv8plus/libnspr_flt4.so
/usr/lib/mps/secv1/libfreebl_hybrid_3.so
/usr/lib/mps/secv1/libfreebl_pure32_3.so
/usr/lib/mps/secv1/libjss3.so
/usr/lib/mps/secv1/libnspr4.so
/usr/lib/mps/secv1/libnss3.so
/usr/lib/mps/secv1/libnssckbi.so
/usr/lib/mps/secv1/libplc4.so
/usr/lib/mps/secv1/libplds4.so
/usr/lib/mps/secv1/libsmime3.so
/usr/lib/mps/secv1/libssl3.so
/usr/lib/mps/secv1/sparcv9/libjss3.so
/usr/lib/mps/secv1/sparcv9/libnspr4.so
/usr/lib/mps/secv1/sparcv9/libnss3.so
/usr/lib/mps/secv1/sparcv9/libnssckbi.so
/usr/lib/mps/secv1/sparcv9/libplc4.so
/usr/lib/mps/secv1/sparcv9/libplds4.so
/usr/lib/mps/secv1/sparcv9/libsmime3.so
/usr/lib/mps/secv1/sparcv9/libssl3.so
/usr/sfw/bin/64
/usr/sfw/bin/certutil
/usr/sfw/bin/cmsutil
/usr/sfw/bin/crlutil
/usr/sfw/bin/modutil
/usr/sfw/bin/pk12util
/usr/sfw/bin/signtool
/usr/sfw/bin/signver
/usr/sfw/bin/sparcv9/certutil
/usr/sfw/bin/sparcv9/cmsutil
/usr/sfw/bin/sparcv9/crlutil
/usr/sfw/bin/sparcv9/modutil
/usr/sfw/bin/sparcv9/pk12util
/usr/sfw/bin/sparcv9/signtool
/usr/sfw/bin/sparcv9/signver
/usr/sfw/bin/sparcv9/ssltap
/usr/sfw/bin/ssltap
/usr/share/lib/mps/secv1/jss3.jar
/usr/share/lib/mps/secv1/sparcv9/jss3.jar

Problem Description:

5083437 Regression in JSS asserts breaks SSLSockets in PS 6.1
 
(from 115924-09)
 
5069683 SSL2 exploitable buffer overflow 
4877287 NSS / JSS : Library crash in SSL Handshaking if certificate has AIAExtension
5044857 null pointer dereference causes crash in CERT_NameToAscii
5009031 Build 0303.5: amadmin based acceptance tests fail with JVM abort on Linux
4961743 Gateway crashes with OOMErrors with AS 7.0 U1/ WS 6.1 and NSS Package 3.3.7
 
(from 115924-08)
 
5016209 Crash in DER_UTCTimeToTime with corrupt certificate
 
(from 115924-07)
 
5016498 JES 2 Build 8 has incorrect Security 115924 and 115926 patches
 
(from 115924-06)
 
5011517 SUNWtlsu tools are missing/corrupt on SPARC and x86 Solaris
 
(from 115924-05)
 
4991529 - improve NSS error messages - serviceability issue
5004563 - Web Server crashes when client presents an invalid cert
 
(from 115924-04)
 
4972840 - potential DOS target on NSS libraries
 
(from 115924-03)
 
4933535 - JSS client certificate callback API allows one to have a successful handshake
4945089 - ASN1 Decoder can suffer denial of service attacks
 
(from 115924-02)
 
4888311 CertStore.delete certificate does not work for CA certificate
4886464 SSL Client authentication is not working
4885952 JVM crash occuring during SSLSocket.read()
 
(from 115924-01)
 
4903564 Security libraries (3.3.5+) for Orion should install in new location


Patch Installation Instructions:
-------------------------------- 
Refer to the man pages for instructions on using 'patchadd' and
'patchrm' scripts provided with Solaris.
Any other special or non-generic installation instructions should be
described below as special instructions.  The following example
installs a patch to a standalone machine:
 
       example# patchadd /var/spool/patch/104945-02
 
The following example removes a patch from a standalone system:
 
       example# patchrm 104945-02
 
For additional examples please see the appropriate man pages.


Special Install Instructions:
-----------------------------
None.


README -- Last modified date: Saturday, November 10, 2012