[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2019:1951-01 -- Redhat nspr, nss

ID: oval:org.secpod.oval:def:69482Date: (C)2021-03-02   (M)2024-04-17
Class: PATCHFamily: unix




Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss , nspr . Security Fix: * nss: NULL pointer dereference in several CMS functions resulting in a denial of service * nss: Out-of-bounds read when importing curve25519 private key * nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault * nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * PQG verify fails when create DSA PQG parameters because the counts aren"t returned correctly. * zeroization of AES context missing * RSA Pairwise consistency test * FIPS updated for nss-softoken POST * DH/ECDH key tests missing for the PG parameters * NSS should implement continuous random test on it"s seed data or use the kernel AF_ALG interface for random * support setting supported signature algorithms in strsclnt utility * certutil -F with no parameters is killed with segmentation fault message * NSS: Support for IKE/IPsec typical PKIX usage so libreswan can use nss without rejecting certs based on EKU * NSS should use getentropy for seeding its RNG, not /dev/urandom. Needs update to NSS 3.37 * Disable TLS 1.3 in FIPS mode * Wrong alert sent when client uses PKCS#1 signatures in TLS 1.3 * x25519 allowed in FIPS mode * post handshake authentication with selfserv does not work if SSL_ENABLE_SESSION_TICKETS is set Enhancement: * Move IKEv1 and IKEv2 KDF"s from libreswan to nss-softkn

Platform:
Red Hat Enterprise Linux 8
Product:
nspr
nss
Reference:
RHSA-2019:1951-01
CVE-2018-18508
CVE-2019-11719
CVE-2019-11727
CVE-2019-11729
CVE-2019-17007
CVE    5
CVE-2019-17007
CVE-2018-18508
CVE-2019-11729
CVE-2019-11719
...

© SecPod Technologies