OBSOLETE Patch-ID# 125359-15
Download this patch from My Oracle Support
Your use of the firmware, software and any other materials contained
in this update is subject to My Oracle Support Terms of Use, which
may be viewed at My Oracle Support.
|
For further information on patching best practices and resources, please
see the following links:
|
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
|
Keywords: nspr nss jss security java_es-5
Synopsis: Obsoleted by: 125359-18 NSS_NSPR_JSS 3.13.1 Solaris_x86: NSPR 4.8.9 / NSS 3.13.1 / JSS 4.3.2 Maintenance Release
Date: Feb/08/2012
Install Requirements: NA
Solaris Release: 8_x86 9_x86 10_x86
SunOS Release: 5.8_x86 5.9_x86 5.10_x86
Unbundled Product: NSS_NSPR_JSS
Unbundled Release: 3.13.1
Xref: This patch available for sparc as patch 125358
Topic:
Relevant Architectures: i386
Bugs fixed with this patch:
Changes incorporated in this version: 13341290 13341314
Patches accumulated and obsoleted by this patch:
Patches which conflict with this patch:
Patches required with this patch:
Obsoleted by:
Files included with this patch:
/usr/include/mps/base64.h
/usr/include/mps/blapit.h
/usr/include/mps/cert.h
/usr/include/mps/certdb.h
/usr/include/mps/certt.h
/usr/include/mps/ciferfam.h
/usr/include/mps/cmmf.h
/usr/include/mps/cmmft.h
/usr/include/mps/cms.h
/usr/include/mps/cmsreclist.h
/usr/include/mps/cmst.h
/usr/include/mps/crmf.h
/usr/include/mps/crmft.h
/usr/include/mps/cryptohi.h
/usr/include/mps/cryptoht.h
/usr/include/mps/ecl-exp.h
/usr/include/mps/hasht.h
/usr/include/mps/jar-ds.h
/usr/include/mps/jar.h
/usr/include/mps/jarfile.h
/usr/include/mps/key.h
/usr/include/mps/keyhi.h
/usr/include/mps/keyt.h
/usr/include/mps/keythi.h
/usr/include/mps/nspr.h
/usr/include/mps/nss.h
/usr/include/mps/nssb64.h
/usr/include/mps/nssb64t.h
/usr/include/mps/nssbase.h
/usr/include/mps/nssbaset.h
/usr/include/mps/nssckbi.h
/usr/include/mps/nssckepv.h
/usr/include/mps/nssckft.h
/usr/include/mps/nssckfw.h
/usr/include/mps/nssckfwc.h
/usr/include/mps/nssckfwt.h
/usr/include/mps/nssckg.h
/usr/include/mps/nssckmdt.h
/usr/include/mps/nssckt.h
/usr/include/mps/nssilckt.h
/usr/include/mps/nssilock.h
/usr/include/mps/nsslocks.h
/usr/include/mps/nssrwlk.h
/usr/include/mps/nssrwlkt.h
/usr/include/mps/obsolete/pralarm.h
/usr/include/mps/obsolete/probslet.h
/usr/include/mps/obsolete/protypes.h
/usr/include/mps/obsolete/prsem.h
/usr/include/mps/ocsp.h
/usr/include/mps/ocspt.h
/usr/include/mps/p12.h
/usr/include/mps/p12plcy.h
/usr/include/mps/p12t.h
/usr/include/mps/pk11func.h
/usr/include/mps/pk11pqg.h
/usr/include/mps/pk11priv.h
/usr/include/mps/pk11pub.h
/usr/include/mps/pk11sdr.h
/usr/include/mps/pkcs11.h
/usr/include/mps/pkcs11f.h
/usr/include/mps/pkcs11n.h
/usr/include/mps/pkcs11p.h
/usr/include/mps/pkcs11t.h
/usr/include/mps/pkcs11u.h
/usr/include/mps/pkcs12.h
/usr/include/mps/pkcs12t.h
/usr/include/mps/pkcs7t.h
/usr/include/mps/plarena.h
/usr/include/mps/plarenas.h
/usr/include/mps/plbase64.h
/usr/include/mps/plerror.h
/usr/include/mps/plgetopt.h
/usr/include/mps/plhash.h
/usr/include/mps/plresolv.h (deleted)
/usr/include/mps/plstr.h
/usr/include/mps/portreg.h
/usr/include/mps/pratom.h
/usr/include/mps/prbit.h
/usr/include/mps/prclist.h
/usr/include/mps/prcmon.h
/usr/include/mps/prcountr.h
/usr/include/mps/prcpucfg.h
/usr/include/mps/prcvar.h
/usr/include/mps/prdtoa.h
/usr/include/mps/preenc.h
/usr/include/mps/prenv.h
/usr/include/mps/prerr.h
/usr/include/mps/prerror.h
/usr/include/mps/prinet.h
/usr/include/mps/prinit.h
/usr/include/mps/prinrval.h
/usr/include/mps/prio.h
/usr/include/mps/pripcsem.h
/usr/include/mps/private/pprio.h
/usr/include/mps/private/pprthred.h
/usr/include/mps/private/prpriv.h
/usr/include/mps/prlink.h
/usr/include/mps/prlock.h
/usr/include/mps/prlog.h
/usr/include/mps/prlong.h
/usr/include/mps/prmem.h
/usr/include/mps/prmon.h
/usr/include/mps/prmwait.h
/usr/include/mps/prnetdb.h
/usr/include/mps/prolock.h
/usr/include/mps/prpdce.h
/usr/include/mps/prprf.h
/usr/include/mps/prproces.h
/usr/include/mps/prrng.h
/usr/include/mps/prrwlock.h
/usr/include/mps/prshm.h
/usr/include/mps/prshma.h
/usr/include/mps/prsystem.h
/usr/include/mps/prthread.h
/usr/include/mps/prtime.h
/usr/include/mps/prtpool.h
/usr/include/mps/prtrace.h
/usr/include/mps/prtypes.h
/usr/include/mps/prvrsion.h
/usr/include/mps/prwin16.h
/usr/include/mps/secasn1.h
/usr/include/mps/secasn1t.h
/usr/include/mps/seccomon.h
/usr/include/mps/secder.h
/usr/include/mps/secdert.h
/usr/include/mps/secdig.h
/usr/include/mps/secdigt.h
/usr/include/mps/secerr.h
/usr/include/mps/sechash.h
/usr/include/mps/secitem.h
/usr/include/mps/secmime.h
/usr/include/mps/secmod.h
/usr/include/mps/secmodt.h
/usr/include/mps/secoid.h
/usr/include/mps/secoidt.h
/usr/include/mps/secpkcs5.h
/usr/include/mps/secpkcs7.h
/usr/include/mps/secport.h
/usr/include/mps/shsign.h
/usr/include/mps/smime.h
/usr/include/mps/ssl.h
/usr/include/mps/sslerr.h
/usr/include/mps/sslproto.h
/usr/include/mps/sslt.h
/usr/include/mps/utilrename.h
/usr/include/mps/watcomfx.h (deleted)
/usr/lib/mps/amd64/libfreebl3.chk
/usr/lib/mps/amd64/libfreebl3.so
/usr/lib/mps/amd64/libnspr4.so
/usr/lib/mps/amd64/libnss3.so
/usr/lib/mps/amd64/libnssckbi.so
/usr/lib/mps/amd64/libnssdbm3.chk
/usr/lib/mps/amd64/libnssdbm3.so
/usr/lib/mps/amd64/libnssutil3.so
/usr/lib/mps/amd64/libplc4.so
/usr/lib/mps/amd64/libplds4.so
/usr/lib/mps/amd64/libsmime3.so
/usr/lib/mps/amd64/libsoftokn3.chk
/usr/lib/mps/amd64/libsoftokn3.so
/usr/lib/mps/amd64/libsqlite3.so
/usr/lib/mps/amd64/libssl3.so
/usr/lib/mps/libfreebl3.chk
/usr/lib/mps/libfreebl3.so
/usr/lib/mps/libjss4.so
/usr/lib/mps/libnspr4.so
/usr/lib/mps/libnss3.so
/usr/lib/mps/libnssckbi.so
/usr/lib/mps/libnssdbm3.chk
/usr/lib/mps/libnssdbm3.so
/usr/lib/mps/libnssutil3.so
/usr/lib/mps/libplc4.so
/usr/lib/mps/libplds4.so
/usr/lib/mps/libsmime3.so
/usr/lib/mps/libsoftokn3.chk
/usr/lib/mps/libsoftokn3.so
/usr/lib/mps/libsqlite3.so
/usr/lib/mps/libssl3.so
/usr/lib/mps/secv1/amd64/libnssdbm3.chk
/usr/lib/mps/secv1/amd64/libnssdbm3.so
/usr/lib/mps/secv1/amd64/libnssutil3.so
/usr/lib/mps/secv1/amd64/libsqlite3.so
/usr/lib/mps/secv1/libnssdbm3.chk
/usr/lib/mps/secv1/libnssdbm3.so
/usr/lib/mps/secv1/libnssutil3.so
/usr/lib/mps/secv1/libsqlite3.so
/usr/lib/pkgconfig/nspr.pc
/usr/lib/pkgconfig/nss.pc
/usr/sfw/bin/addbuiltin
/usr/sfw/bin/amd64/addbuiltin
/usr/sfw/bin/amd64/certutil
/usr/sfw/bin/amd64/cmsutil
/usr/sfw/bin/amd64/crlutil
/usr/sfw/bin/amd64/modutil
/usr/sfw/bin/amd64/pk12util
/usr/sfw/bin/amd64/signtool
/usr/sfw/bin/amd64/signver
/usr/sfw/bin/amd64/ssltap
/usr/sfw/bin/certutil
/usr/sfw/bin/cmsutil
/usr/sfw/bin/crlutil
/usr/sfw/bin/modutil
/usr/sfw/bin/pk12util
/usr/sfw/bin/signtool
/usr/sfw/bin/signver
/usr/sfw/bin/ssltap
/usr/share/lib/mps/jss4.jar
Problem Description:
13341290 DIS-TRUST DIGINOTAR ROOT CERTIFICATE
13341314 (CVE-2011-3389) RIZZO/DUONG CHOSEN PLAINTEXT ATTACK (BEAST) ON SSL/TLS 1.0
(from 125359-14)
12301816 SUNBT6989121 ENABLE AES CRYPTO INSTRUCTIONS (AVALABLE IN WESTMERE SYSTEMS) IN NS
12305711 SUNBT7008530 CERTUTIL -T -D "SQL:." DUMPS CORE
12307252 SUNBT7015161 CORE DUMP WHEN TLS SESSION TICKETS ARE ENABLED AND SESSION CACHE IS
12306440 SUNBT7011578 ENHANCEMENT TO MAKE NSS SEARCH FOR A COMPLETE CHAIN THAT WOULD END
12306340 SUNBT7011215 PROBLEM WITH CERTIFICATE IMPORT INTO CERT9.DB AND TRUST FLAGS USING
12307757 SUNBT7017553 SSL_RECONFIGFD TRIES TO ACCESS ELEMENTS OF A NULL POINTER.
12309095 SUNBT7025511 POSSIBLE MINOR MEMORY LEAK IN SNI CODE
12309169 SUNBT7025937 MEMORY LEAK IN SSL_CANBYPASS
12304214 SUNBT7001826 NSS SUPPORT REQUIRED FOR SOCKET DIRECT PROTOCOL OVER INFINIBAND
(from 125359-13)
6938843 NSS having CKM_TLS_MASTER_KEY_DERIVE_DH enabled causes SSL/ECDHE to fail
6985467 Certutil is able to read and display a der cert from a file
6985501 (CVE-2010-3170) Browser wildcard certificate validation issue
(from 125359-12)
6963575 NSS does not support CKR_PIN_LOCKED from C_Login
6938650 libnssckbi: invalid length for nicknames containing multi-byte characters
6963577 Remove support for Netscape SSL server names (SEC_OID_NS_CERT_EXT_SSL_SERVER_NAME)
6963579 An invalid CRL should not cause all certificates issued by that CA to be considered revoked.
6963580 Unable to build pk11util on OpenSolaris (SunOS 5.11)
6965841 Crash in ServerSessionIDLookup or SSL handshake in client hello
(from 125359-11)
6879749 Re-initialization of NSS 3.12.3 dumps core.
6926538 Linux installpatch does not handle 64 bit systems
6929079 Add multiple roots to NSS 3.12.6
6929081 CERT_PKIXVerifyCert considers a certificate revoked if cert_ProcessOCSPResponse fails for any reason
6929082 Support for TLS compression RFC 3749
6929093 Implement new safe SSL3 & TLS renegotiation (RFC 5746)
6929103 NSPR logging timestamp month number is off by one
6919819 Remove unused header file plresolv.h
6929098 PR_StringToNetAddr("255.255.255.255",ptr) fails on platforms that use inet_addr
6929099 PR_StringToNetAddr("", *ptr) behaviour is inconsistent on windows & solaris
6930970 Expose TLS enableRequireSafeNegotiation in JSS (RFC 5746)
(from 125359-10)
6899482 NSS fails to load softoken looking for sqlite3.dll
6899486 (CVE-2009-3555) SSL3 & TLS Renegotiation Vulnerability
6899542 NSS uses PORT_Memcmp for comparing secret data.
6899543 Timing attack against ssl3ext.c:ssl3_ServerHandleSessionTicketXtn()
6899544 If PK11_ImportCert fails it leaves the certificate undiscoverable by CERT_PKIXVerifyCert
6899546 PK11_ImportAndReturnPrivateKey leaks an arena
6899547 PK11_DEREncodePublicKey leaks a CERTSubjectPublicKeyInfo
6899549 NSS include files key.h and pk11func.h are deprecated
6899561 PR_LoadLibraryWithFlags should have a way to set LOAD_WITH_ALTERED_SEARCH_PATH flag with LoadLibrary
6899565 (CVE-2009-1563) Array indexing error in NSPR's Balloc() leads to floating point memory vulnerability
6899487 Expose Support for SSL & TLS Renegotiation settings in JSS
6899568 Fix leaks in PK11Token.c function make_cert_request()
(from 125359-09)
6874694 pkix_HttpCertStore_FindSocketConnection reuses closed socket OCSP fails
6874700 Multiple object leaks reported by tinderbox
6874701 object leak in libpkix library upon error
6874702 Cryptokey framework requires module to implement GenerateKey when they support KeyPairGeneration
6874707 update RSA/DSA powerupself tests to be compliant for 2011
6874708 CERT_PKIXVerifyCert reports wrong error code when EE cert is expired
6874709 Passing NULL as the value of cert_pi_trustAnchors causes a crash in cert_pkixSetParam
6874710 NSS 3.12.3 (and later) doesn't build on AIX 5.1
6874712 crash freeing named CRL entry on shutdown
6874714 Improve DES and SHA512 for x86_64 platform
6874715 During NSS_NoDB_Init(), softoken tries but fails to load libsqlite3.so crash
6874716 cert7.db/cert8.db "corruption" when importing a large certificate (>64K)
6874717 assert if profile path contains cyrillic chars.
6874719 (CVE-2009-2404) Exploitable heap overflow in NSS shell expression (filename globbing) parsing
6874721 When using cert9 (SQLite3) DB, set or change master password fails
6874722 DBM needs to be FIPS certifiable.
6874723 NSS_InitReadWrite("sql:configdir") leaves behind a pkcs11.txu file if libnssckbi.so is in configdir
6874725 Need function to identify the one and only default internal private key slot.
6874726 Need a generic function a la SECMOD_OpenUserDB() that can be used on non-softoken modules.
6874728 NSS_InitReadWrite("sql:dbdir") causes NSS to look for "sql:dbdir/libnssckbi.so"
6874732 (CRLDP) implement crlDistributionPoint extension in libPKIX
6874734 libPKIX returns wrong NSS error code
6874736 NSS_ENABLE_PKIX_VERIFY=1 causes sec_error_unknown_issuer errors
6874737 libpkix ocsp checker should use "date" argument to obtain the time for cert validity verification
6874738 Miscellaneous crashes in signtool on Windows
6874740 PK11_ImportCRL reports SEC_ERROR_CRL_NOT_FOUND when it fails to import a CRL
6853831 utilrename.h referenced in multiple header files in /usr/include/mps missing in Solaris 10
6874742 Calling SSL_SetSockPeerID a second time leaks the previous value
6874745 CERT_NameToAscii reports "Invalid AVA" whenever value exceeds 384 bytes
6874746 crash in certutil or pp when printing cert with empty subject name
6874747 A failure to import a cert from a P12 file leaves error code set to zero
6874748 NSS_RegisterShutdown can return without unlocking nssShutdownList.lock
6874750 crash when PORT_NewArena fails
6874752 IO timeout during cert fetching makes libpkix abort validation
6870083 RH4:NSS3.12.3xDS5.2:error while loading shared libraries: libnssutil3.so: cannot open shared object
6846470 Messaging Server pipe_master program fails after installing NSS patch 119211-20
6874819 Crash or data corruption in NSPR's TransmitFile and SendFile on HPUX
6874820 PR_ExplodeTime() works only if given a PRTime argument between year 1901-2099
(from 125359-08)
6821612 NSS 3.12.x series
6821617 cert name matching: RFC 2818 vs. backwards compatibility (wildcards)
6782276 Error override "trust flags" don't override invalid CA certs in NSS 3.12
6821618 Stop honoring digital signatures in certificates and CRLs based on weak hashes
6799382 CERT_AsciiToName incorrectly parses a name in which an RDN has two or more AVAs separated by '+'
6821620 add environment variable to disable/enable hash algorithms in cert/CRL signatures
6767341 Need to add RPATH to 64-bit libraries on HP-UX
6764022 Using NSS 3.12 makes Directory Server daemon ns-slapd dump core on some Unix platforms
6821630 In prlink.c errStrBuf is not thread-safe.
6821631 ForkAndExec is crashing on Solaris 8/9 due to environ being NULL
6821633 support HmacSHA256, HmacSHA384, and HmacSHA512
6821634 add support to JSS to initialize NSS with more options
6821638 Wrong OIDs for SHA-256, SHA-384, and SHA-512.
6821640 Add SEED support to JSS.
6821643 Expose the TLS session ticket extension (STE)
6821645 JSS doesn't support AES Key unwrapping
(from 125359-07)
6737818 Add Entrust root CA certificate(s) to NSS
6737820 Add VeriSign Class 3 Public Primary CA - G5 to NSS
6737821 Add thawte Primary Root CA to NSS
6737822 Add GeoTrust Primary Certification Authority root to NSS
6737826 Add Trustwave Certification Authority certificate to NSS
6737827 Add COMODO Certification Authority certificate to NSS
6737828 Add Network Solutions Certificate Authority root to NSS
6737829 Add DigiNotar Root CA root to NSS
6763177 add network solutions and diginotar root certs to NSS
6763626 Don't send an SNI Client Hello extension bearing an IPv6 address
6737832 Fix PK11_GenerateKeyPair for ECC keys on the 3.11 branch
6737834 Can't import certificate into cert database in FIPS mode (certutil).
6737837 PK11_Authenticate, PK11_DoPassword fail on 3rd party slots if NSS softoken is in FIPS140-2 mode
6737838 Session cache locks not freed at shutdown.
6612960 Assertion failures if SSL_ForceHandshake is called
6737841 threads hanging in nss_InitLock
6737843 memory leak in trustdomain.c
6737846 certutil -L -h token doesn't report token authentication failure
6737848 certutil -K behavior doesn't match usage
6737850 modutil -disable command not disabling modules' slots
6737852 Lock from ssl_InitSymWrapKeysLock not freed at shutdown.
6737854 Certification path validation fails when "Authority Key Identifier" extension contains key identifie
6763630 NSS misbehaves badly in the presence of a disabled PKCS#11 slot
6737862 The primordial thread is attached again in _PR_CleanupIO in PR_Cleanup.
6763248 "RC2/CBC/NoPadding cannot use a null parameter" error message pops up when trying to import a PKCS12
6752510 NSS.pc requires NSPR >= 4.6, but NSPR.pc doesn't exist
6725359 private directory is missing in SUNWprd package for OpenSolaris
6492310 lint warnings in keythi.h
(from 125359-06)
6643071 Installpatch of T121656-16 on linux is failed by dependency error.
6657288 Add Identrust, Truktrust, SwissSign Roots
6657292 key search functions ignore the nickname argument
6657317 Correct NSS error string for SEC_ERROR_OCSP_RESPONDER_CERT_INVALID
6657320 built-in root certs module shows no slot name
6657322 Optstate not freed in ocspclnt.
6657815 get offset from UTC out of NSPR
6657816 PR_ImplodeTime only works with years 1901-2099
6657818 A process created by PR_CreateProcess with an inherited fd can't pass any inheritable fd to a child
6657820 PR_CreateProcess() function drops empty string parameters
6657822 port NSPR to Windows XP / Server 2003 64bit for AMD64
6657823 Unix: clean up NSPR when the NSPR library is unloaded
6657826 PR_GetFileInfo much slower on Windows than native system call
6657829 PR_CallOnce/PR_CallOnceWithArg do not set NSPR error code if once->initialized is TRUE and once->sta
6657830 add capability to parse long command line option names
6657834 memory leak in prcmon.c
6657837 Use getaddrinfo/getnameinfo
6626993 JSS should have a method that states true/false if a token needs login
6630163 spurious javax.crypto.ShortBufferException with SUNWjss (4.0,REV=2004.11.05.02.31)
(from 125359-05)
6624319 Add multiple new roots to NSS
6549319 NSS needs a function to indicate bypassability of a private key
6624326 certutil -T crashes if -h <token> specifies a nonexistant token
6624328 NSS allocation functions don't always set SEC_ERROR_NO_MEMORY
6624329 SSL_CanBypass leaks memory
6624331 Bug in PK11_ListPrivKeysInSlot
6624334 OOM crash in softoken
6624335 unexported api calls in p12plcy.h
6624337 unexported api calls in pkcs12.h
6624338 pk12util leaks password strings
6624342 libSSL leaks global array of trusted client auth CA names
6624343 Infinite loop in CERT_CertChainFromCert
6624344 PK11_FindCertFromNickname sets no error code when token not found
6624346 PK11_FindCertByIssuerAndSN must validate input arguments
6624348 Do not send hello extensions when using SSL v3.0
6624350 ssl_GetPrivate can corrupt non-SSL private structures
6624351 two public SSL functions require PRFD* to point to SSL layer
6624352 RSA certificate request succeeds even when underlying pkcs11 module returns error
6624354 Make DEBUG_PKCS11 work for optimized builds, too
6624356 Three root CA certs don't have explicit CKA_TRUST_STEP_UP_APPROVED flags
6580347 PR_Accept() on IPv6 socket returns invalid argument on Windows
6596161 PR_SendFile spins on Solaris due to Solaris sendfile return 0 (to mean sendfile failure)
(from 125359-04)
6605712 Revert JSS build to support Java 1.4 again
6526738 Add nspr.pc to SUNWprd and nss.pc to SUNWtlsd
(from 125359-03)
6560823 Unauthorized OCSP response error
(from 125359-02)
6555587 memory leak in mp_bdivmod
6555589 Export DER_Generalized* and DER_TimeChoice* functions
6547236 crash in certutil when high validity value is specified
6555590 DER_TimeToGeneralizedTimeArena and DER_TimeToUTCTime don't check for valid range and may leak
6555588 bogus PKCS12_KEY_USAGE in secoid table
4926429 PR_vsnprintf can crash with finite precision string specifiers and non-NULL terminated strings
6524809 JSS SSLSocket.close() may be blocked and not interrupting the SSLSocket.read() thread
(from 125359-01)
6507762 Two SSL2 security vulnerabilities found in NSS
6507627 overflow in session counter leads to crash
6423970 certutil does not detect and report error when unsupported ONB curve is specified on command line
6524565 Changes in Daylight Savings Time computations
6524651 Update HP-UX IPv6 code
Patch Installation Instructions:
--------------------------------
Refer to the man pages for instructions on using 'patchadd' and
'patchrm' scripts provided with Solaris.
Any other special or non-generic installation instructions should be
described below as special instructions. The following example
installs a patch to a standalone machine:
example# patchadd /var/spool/patch/104945-02
The following example removes a patch from a standalone system:
example# patchrm 104945-02
For additional examples please see the appropriate man pages.
Special Install Instructions:
-----------------------------
How to choose the right NSPR/NSS/JSS patch for your system:
1/ Get the package version for SUNWpr and SUNtls
using the following commands:
# pkginfo -l SUNWpr | grep VERSION
and
# pkginfo -l SUNWtls | grep VERSION
and
# pkginfo -l SUNWjss | grep VERSION
2/ Choose the right patch series from the table below.
IMPORTANT: You may have to install 1 or 2 patches to update
all NSPR/NSS/JSS to the same compatible level, depending on how
your system was previously installed and updated.
==================================================================
|Solaris |Package version |Patch* |
|========|=============================================|=========|
|8 SPARC |SUNWpr: VERSION=4.1.2,REV=2002.09.03.00.17 |119209-xx|
| |SUNWtls: VERSION=3.3.2,REV=2002.09.18.12.49 | |
| |SUNWjss: VERSION=3.1.2.3,REV=2003.03.08.12.17| |
|--------|---------------------------------------------|---------|
|9 SPARC |SUNWpr: VERSION=4.1.2,REV=2002.09.03.00.17 |119211-xx|
| |SUNWtls: VERSION=3.3.2,REV=2002.09.18.12.49 | |
| |SUNWjss: VERSION=3.1.2.3,REV=2003.03.08.12.17| |
|--------|---------------------------------------------|---------|
|9 x86 |SUNWpr: VERSION=4.1.3,REV=2003.01.09.13.59 |119212-xx|
| |SUNWtls: VERSION=3.3.3,REV=2003.01.09.17.07 | |
| |SUNWjss: VERSION=3.1.2.3,REV=2003.03.08.13.04| |
|--------|---------------------------------------------|---------|
|10 SPARC|SUNWpr: VERSION=4.5.1,REV=2004.11.05.02.30 |119213-xx|
| |SUNWtls: VERSION=3.9.5,REV=2005.01.14.17.27 | |
| |SUNWjss: VERSION=4.0,REV=2004.11.05.02.31 | |
|--------|---------------------------------------------|---------|
|10 x86 |SUNWpr: VERSION=4.5.1,REV=2004.11.05.03.44 |119214-xx|
| |SUNWtls: VERSION=3.9.5,REV=2005.01.14.19.03 | |
| |SUNWjss: VERSION=4.0,REV=2004.11.05.03.05 | |
|--------|---------------------------------------------|---------|
|8, 9, 10|SUNWpr: VERSION=4.6.4,REV=2006.11.16.20.40 |125358-xx|
|SPARC |SUNWtls: VERSION=3.11.4,REV=2006.11.16.20.40 | |
| |SUNWjss: VERSION=4.2.4,REV=2006.11.16.20.40 | |
|--------|---------------------------------------------|---------|
|9, 10 |SUNWpr: VERSION=4.6.4,REV=2006.11.16.21.41 |125359-xx|
|x86 |SUNWtls: VERSION=3.11.4,REV=2006.11.16.21.41 | |
| |SUNWjss: VERSION=4.2.4,REV=2006.11.16.21.41 | |
==================================================================
*: always choose the highest available revision of the patch
Note:
VERSION represents the version of the package, not the version
of NSPR, NSS or JSS.
To get the actual version of the product installed on your
system, type the following commands:
version of NSPR:
$ pkgparam SUNWpr SUNW_PRODVERS
version of NSS:
$ pkgparam SUNWtls SUNW_PRODVERS
version of JSS:
$ pkgparam SUNWjss SUNW_PRODVERS
IMPORTANT NOTE:
** This version of NSS is known to be incompatible with certain versions of Sun Directory Server version 5.2. **
** Installing it without corrective action will result in directory service stopped. **
** Newer versions of Directory Server are not affected by this incompatibility issue. **
** Please see http://docs.oracle.com for detailed information on this issue, including the availability
of a related Directory Server version 5.2 patch.**
** This behavior can also be changed by setting an environment variable (details below).**
The PKCS#11 cryptographic software interface standard used in many Sun server products requires every process that uses a
PKCS#11 cryptographic library to initialize that library for itself, and not to rely on the initialization that may have
been done by the parent process to leave the cryptographic library in a usable state. Programs that do not conform to
this requirement, but instead rely on the library being usable after it was initialized by a parent process, are not
guaranteed to work with all hardware and software cryptographic modules conforming to that interface standard.
Beginning in this release, NSS's cryptographic library requires programs that use it to conform to the requirement that
every process must initialize the library for itself.
Some old versions of Sun server applications do not conform to those interface requirements. Customers who are still using
those old versions, and have not updated the server products to conforming versions, may find that those products have
problems with this release of NSS's cryptographic libraries.
To disable the enforcement of this requirement an environment variable can be set:
NSS_STRICT_NOFORK=DISABLED
This environment variable is a workaround that will make NSS behave as it did in prior versions. However, the
aforementioned compatibility problems between Directory Server version 5.2 and some PKCS#11 cryptographic modules still
remain.
** The appropriate fix is to get the Directory Server 5.2 patch, when available. **
README -- Last modified date: Wednesday, August 6, 2014