RHSA-2019:1951-01 -- Redhat nspr, nssID: oval:org.secpod.oval:def:66757 | Date: (C)2020-11-09 (M)2024-04-17 |
Class: PATCH | Family: unix |
Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss , nspr . Security Fix: * nss: NULL pointer dereference in several CMS functions resulting in a denial of service * nss: Out-of-bounds read when importing curve25519 private key * nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault * nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * PQG verify fails when create DSA PQG parameters because the counts aren"t returned correctly. * zeroization of AES context missing * RSA Pairwise consistency test * FIPS updated for nss-softoken POST * DH/ECDH key tests missing for the PG parameters * NSS should implement continuous random test on it"s seed data or use the kernel AF_ALG interface for random * support setting supported signature algorithms in strsclnt utility * certutil -F with no parameters is killed with segmentation fault message * NSS: Support for IKE/IPsec typical PKIX usage so libreswan can use nss without rejecting certs based on EKU * NSS should use getentropy for seeding its RNG, not /dev/urandom. Needs update to NSS 3.37 * Disable TLS 1.3 in FIPS mode * Wrong alert sent when client uses PKCS#1 signatures in TLS 1.3 * x25519 allowed in FIPS mode * post handshake authentication with selfserv does not work if SSL_ENABLE_SESSION_TICKETS is set Enhancement: * Move IKEv1 and IKEv2 KDF"s from libreswan to nss-softkn