- Issued:
- 2019-07-30
- Updated:
- 2019-07-30
RHSA-2019:1951 - Moderate: nss and nspr security, bug fix, and enhancement update
Synopsis
Moderate: nss and nspr security, bug fix, and enhancement update
Type/Severity
Security Advisory Moderate
Topic
An update for nss and nspr is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities.
The following packages have been upgraded to a later upstream version: nss (3.44.0), nspr (4.21.0). (BZ#1713187, BZ#1713188)
Security Fix(es):
-
nss: NULL pointer dereference in several CMS functions resulting in a denial of service (CVE-2018-18508)
-
nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719)
-
nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729)
-
nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
PQG verify fails when create DSA PQG parameters because the counts aren't returned correctly. (BZ#1685325)
-
zeroization of AES context missing (BZ#1719629)
-
RSA Pairwise consistency test (BZ#1719630)
-
FIPS updated for nss-softoken POST (BZ#1722373)
-
DH/ECDH key tests missing for the PG parameters (BZ#1722374)
-
NSS should implement continuous random test on it's seed data or use the kernel AF_ALG interface for random (BZ#1725059)
-
support setting supported signature algorithms in strsclnt utility (BZ#1725110)
-
certutil -F with no parameters is killed with segmentation fault message (BZ#1725115)
-
NSS: Support for IKE/IPsec typical PKIX usage so libreswan can use nss without rejecting certs based on EKU (BZ#1725116)
-
NSS should use getentropy() for seeding its RNG, not /dev/urandom. Needs update to NSS 3.37 (BZ#1725117)
-
Disable TLS 1.3 in FIPS mode (BZ#1725773)
-
Wrong alert sent when client uses PKCS#1 signatures in TLS 1.3 (BZ#1728259)
-
x25519 allowed in FIPS mode (BZ#1728260)
-
post handshake authentication with selfserv does not work if SSL_ENABLE_SESSION_TICKETS is set (BZ#1728261)
Enhancement(s):
- Move IKEv1 and IKEv2 KDF's from libreswan to nss-softkn (BZ#1719628)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, applications using NSS or NSPR (for example, Firefox) must be restarted for this update to take effect.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for x86_64 | 8 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 8.8 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 8.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 8.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 8.2 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 8.1 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 8.0 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 8.8 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 8.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 8.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 8.2 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 8.1 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension | 8.8 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension | 8.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension | 8.4 | x86_64 |
| Red Hat Enterprise Linux for Power, little endian | 8 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 8.8 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 8.6 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 8.4 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 8.2 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 8.1 | ppc64le |
| Red Hat Enterprise Linux for IBM z Systems | 8 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 8.8 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 8.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 8.4 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 8.2 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 8.1 | s390x |
| Red Hat Enterprise Linux for ARM 64 | 8 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 8.8 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 8.6 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 8.4 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 8.2 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 8.1 | aarch64 |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 8.8 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 8.6 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 8.4 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 8.2 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 8.1 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 8.0 | ppc64le |
| Red Hat Enterprise Linux Server - TUS | 8.8 | x86_64 |
| Red Hat Enterprise Linux Server - TUS | 8.6 | x86_64 |
| Red Hat Enterprise Linux Server - TUS | 8.4 | x86_64 |
| Red Hat Enterprise Linux Server - TUS | 8.2 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 8.6 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 8.4 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 8.2 | x86_64 |
Updated Packages
- nspr-debugsource-4.21.0-2.el8_0.s390x.rpm
- nss-softokn-debuginfo-3.44.0-7.el8_0.aarch64.rpm
- nss-softokn-freebl-3.44.0-7.el8_0.i686.rpm
- nss-debuginfo-3.44.0-7.el8_0.ppc64le.rpm
- nspr-debuginfo-4.21.0-2.el8_0.ppc64le.rpm
- nss-softokn-freebl-3.44.0-7.el8_0.x86_64.rpm
- nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.s390x.rpm
- nss-debugsource-3.44.0-7.el8_0.aarch64.rpm
- nss-sysinit-3.44.0-7.el8_0.x86_64.rpm
- nss-sysinit-debuginfo-3.44.0-7.el8_0.i686.rpm
- nss-sysinit-debuginfo-3.44.0-7.el8_0.x86_64.rpm
- nss-tools-debuginfo-3.44.0-7.el8_0.s390x.rpm
- nss-debugsource-3.44.0-7.el8_0.x86_64.rpm
- nss-softokn-debuginfo-3.44.0-7.el8_0.s390x.rpm
- nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.i686.rpm
- nss-softokn-freebl-devel-3.44.0-7.el8_0.s390x.rpm
- nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.aarch64.rpm
- nspr-4.21.0-2.el8_0.aarch64.rpm
- nss-3.44.0-7.el8_0.s390x.rpm
- nss-3.44.0-7.el8_0.src.rpm
- nss-3.44.0-7.el8_0.i686.rpm
- nss-debugsource-3.44.0-7.el8_0.s390x.rpm
- nss-debuginfo-3.44.0-7.el8_0.x86_64.rpm
- nss-debuginfo-3.44.0-7.el8_0.s390x.rpm
- nss-debuginfo-3.44.0-7.el8_0.aarch64.rpm
- nss-util-debuginfo-3.44.0-7.el8_0.i686.rpm
- nspr-debugsource-4.21.0-2.el8_0.i686.rpm
- nss-softokn-devel-3.44.0-7.el8_0.i686.rpm
- nss-util-devel-3.44.0-7.el8_0.ppc64le.rpm
- nspr-4.21.0-2.el8_0.ppc64le.rpm
- nss-softokn-3.44.0-7.el8_0.s390x.rpm
- nspr-debuginfo-4.21.0-2.el8_0.aarch64.rpm
- nspr-devel-4.21.0-2.el8_0.s390x.rpm
- nspr-debuginfo-4.21.0-2.el8_0.x86_64.rpm
- nss-softokn-devel-3.44.0-7.el8_0.s390x.rpm
- nss-softokn-freebl-3.44.0-7.el8_0.s390x.rpm
- nss-sysinit-3.44.0-7.el8_0.ppc64le.rpm
- nspr-debugsource-4.21.0-2.el8_0.aarch64.rpm
- nss-util-3.44.0-7.el8_0.aarch64.rpm
- nss-softokn-3.44.0-7.el8_0.x86_64.rpm
- nss-tools-debuginfo-3.44.0-7.el8_0.ppc64le.rpm
- nss-3.44.0-7.el8_0.x86_64.rpm
- nss-softokn-freebl-devel-3.44.0-7.el8_0.ppc64le.rpm
- nss-tools-3.44.0-7.el8_0.ppc64le.rpm
- nss-softokn-debuginfo-3.44.0-7.el8_0.i686.rpm
- nss-tools-3.44.0-7.el8_0.s390x.rpm
- nspr-debugsource-4.21.0-2.el8_0.x86_64.rpm
- nss-util-devel-3.44.0-7.el8_0.i686.rpm
- nss-sysinit-debuginfo-3.44.0-7.el8_0.aarch64.rpm
- nss-tools-debuginfo-3.44.0-7.el8_0.x86_64.rpm
- nss-sysinit-debuginfo-3.44.0-7.el8_0.s390x.rpm
- nss-debugsource-3.44.0-7.el8_0.ppc64le.rpm
- nss-util-3.44.0-7.el8_0.s390x.rpm
- nspr-4.21.0-2.el8_0.src.rpm
- nss-softokn-freebl-devel-3.44.0-7.el8_0.aarch64.rpm
- nss-tools-3.44.0-7.el8_0.aarch64.rpm
- nss-softokn-freebl-devel-3.44.0-7.el8_0.x86_64.rpm
- nss-util-debuginfo-3.44.0-7.el8_0.x86_64.rpm
- nspr-devel-4.21.0-2.el8_0.aarch64.rpm
- nss-softokn-devel-3.44.0-7.el8_0.aarch64.rpm
- nss-tools-debuginfo-3.44.0-7.el8_0.i686.rpm
- nspr-debuginfo-4.21.0-2.el8_0.i686.rpm
- nss-util-debuginfo-3.44.0-7.el8_0.aarch64.rpm
- nss-softokn-3.44.0-7.el8_0.i686.rpm
- nss-devel-3.44.0-7.el8_0.s390x.rpm
- nss-sysinit-3.44.0-7.el8_0.s390x.rpm
- nss-sysinit-3.44.0-7.el8_0.aarch64.rpm
- nspr-4.21.0-2.el8_0.s390x.rpm
- nss-sysinit-debuginfo-3.44.0-7.el8_0.ppc64le.rpm
- nss-tools-3.44.0-7.el8_0.x86_64.rpm
- nss-3.44.0-7.el8_0.ppc64le.rpm
- nss-util-devel-3.44.0-7.el8_0.s390x.rpm
- nss-softokn-debuginfo-3.44.0-7.el8_0.ppc64le.rpm
- nss-tools-debuginfo-3.44.0-7.el8_0.aarch64.rpm
- nss-devel-3.44.0-7.el8_0.aarch64.rpm
- nss-util-debuginfo-3.44.0-7.el8_0.ppc64le.rpm
- nss-util-3.44.0-7.el8_0.x86_64.rpm
- nss-util-3.44.0-7.el8_0.i686.rpm
- nss-util-devel-3.44.0-7.el8_0.x86_64.rpm
- nss-devel-3.44.0-7.el8_0.ppc64le.rpm
- nss-softokn-debuginfo-3.44.0-7.el8_0.x86_64.rpm
- nss-debugsource-3.44.0-7.el8_0.i686.rpm
- nspr-devel-4.21.0-2.el8_0.i686.rpm
- nspr-4.21.0-2.el8_0.i686.rpm
- nspr-debuginfo-4.21.0-2.el8_0.s390x.rpm
- nss-softokn-3.44.0-7.el8_0.ppc64le.rpm
- nss-util-devel-3.44.0-7.el8_0.aarch64.rpm
- nss-softokn-freebl-devel-3.44.0-7.el8_0.i686.rpm
- nss-softokn-3.44.0-7.el8_0.aarch64.rpm
- nss-debuginfo-3.44.0-7.el8_0.i686.rpm
- nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.ppc64le.rpm
- nss-3.44.0-7.el8_0.aarch64.rpm
- nss-devel-3.44.0-7.el8_0.i686.rpm
- nss-softokn-devel-3.44.0-7.el8_0.ppc64le.rpm
- nss-util-debuginfo-3.44.0-7.el8_0.s390x.rpm
- nss-devel-3.44.0-7.el8_0.x86_64.rpm
- nss-softokn-devel-3.44.0-7.el8_0.x86_64.rpm
- nspr-devel-4.21.0-2.el8_0.ppc64le.rpm
- nspr-debugsource-4.21.0-2.el8_0.ppc64le.rpm
- nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.x86_64.rpm
- nss-softokn-freebl-3.44.0-7.el8_0.ppc64le.rpm
- nss-softokn-freebl-3.44.0-7.el8_0.aarch64.rpm
- nss-util-3.44.0-7.el8_0.ppc64le.rpm
- nspr-devel-4.21.0-2.el8_0.x86_64.rpm
- nspr-4.21.0-2.el8_0.x86_64.rpm
Fixes
- This content is not included.BZ - 1671310
- This content is not included.BZ - 1685325
- This content is not included.BZ - 1719629
- This content is not included.BZ - 1719630
- This content is not included.BZ - 1722373
- This content is not included.BZ - 1722374
- This content is not included.BZ - 1725059
- This content is not included.BZ - 1725110
- This content is not included.BZ - 1725115
- This content is not included.BZ - 1725116
- This content is not included.BZ - 1728259
- This content is not included.BZ - 1728260
- This content is not included.BZ - 1728261
- This content is not included.BZ - 1728436
- This content is not included.BZ - 1728437
- This content is not included.BZ - 1730988
CVEs
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.