Описание
Recommended update for mozilla-nspr, mozilla-nss
This update for mozilla-nspr fixes the following issues:
mozilla-nspr was updated to version 4.32:
- implement new socket option PR_SockOpt_DontFrag
- support larger DNS records by increasing the default buffer size for DNS queries
- Lock access to PRCallOnceType members in PR_CallOnce* for thread safety bmo#1686138
- PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get information about the operating system build version.
Mozilla NSS was updated to version 3.68:
- bmo#1713562 - Fix test leak.
- bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
- bmo#1693206 - Implement PKCS8 export of ECDSA keys.
- bmo#1712883 - DTLS 1.3 draft-43.
- bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
- bmo#1713562 - Validate ECH public names.
- bmo#1717610 - Add function to get seconds from epoch from pkix::Time.
update to NSS 3.67
- bmo#1683710 - Add a means to disable ALPN.
- bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).
- bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.
- bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.
- bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.
update to NSS 3.66
- bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.
- bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.
- bmo#1708307 - Remove Trustis FPS Root CA from NSS.
- bmo#1707097 - Add Certum Trusted Root CA to NSS.
- bmo#1707097 - Add Certum EC-384 CA to NSS.
- bmo#1703942 - Add ANF Secure Server Root CA to NSS.
- bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.
- bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.
- bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.
- bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.
- bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.
- bmo#1709291 - Add VerifyCodeSigningCertificateChain.
update to NSS 3.65
- bmo#1709654 - Update for NetBSD configuration.
- bmo#1709750 - Disable HPKE test when fuzzing.
- bmo#1566124 - Optimize AES-GCM for ppc64le.
- bmo#1699021 - Add AES-256-GCM to HPKE.
- bmo#1698419 - ECH -10 updates.
- bmo#1692930 - Update HPKE to final version.
- bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
- bmo#1703936 - New coverity/cpp scanner errors.
- bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
- bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
- bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.
update to NSS 3.64
- bmo#1705286 - Properly detect mips64.
- bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and disable_crypto_vsx.
- bmo#1698320 - replace __builtin_cpu_supports('vsx') with ppc_crypto_support() for clang.
- bmo#1613235 - Add POWER ChaCha20 stream cipher vector acceleration.
Fixed in 3.63
- bmo#1697380 - Make a clang-format run on top of helpful contributions.
- bmo#1683520 - ECCKiila P384, change syntax of nested structs initialization to prevent build isses with GCC 4.8.
- bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual scalar multiplication.
- bmo#1683520 - ECCKiila P521, change syntax of nested structs initialization to prevent build isses with GCC 4.8.
- bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual scalar multiplication.
- bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
- bmo#1694214 - tstclnt can't enable middlebox compat mode.
- bmo#1694392 - NSS does not work with PKCS #11 modules not supporting profiles.
- bmo#1685880 - Minor fix to prevent unused variable on early return.
- bmo#1685880 - Fix for the gcc compiler version 7 to support setenv with nss build.
- bmo#1693217 - Increase nssckbi.h version number for March 2021 batch of root CA changes, CA list version 2.48.
- bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's 'Chambers of Commerce' and 'Global Chambersign' roots.
- bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
- bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
- bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
- bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs from NSS.
- bmo#1687822 - Turn off Websites trust bit for the “Staat der Nederlanden Root CA - G3” root cert in NSS.
- bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce Root - 2008' and 'Global Chambersign Root - 2008’.
- bmo#1694291 - Tracing fixes for ECH.
update to NSS 3.62
- bmo#1688374 - Fix parallel build NSS-3.61 with make
- bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add() can corrupt 'cachedCertTable'
- bmo#1690583 - Fix CH padding extension size calculation
- bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
- bmo#1690421 - Install packaged libabigail in docker-builds image
- bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
- bmo#1674819 - Fixup a51fae403328, enum type may be signed
- bmo#1681585 - Add ECH support to selfserv
- bmo#1681585 - Update ECH to Draft-09
- bmo#1678398 - Add Export/Import functions for HPKE context
- bmo#1678398 - Update HPKE to draft-07
update to NSS 3.61
- bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key values under certain conditions.
- bmo#1684300 - Fix default PBE iteration count when NSS is compiled with NSS_DISABLE_DBM.
- bmo#1651411 - Improve constant-timeness in RSA operations.
- bmo#1677207 - Upgrade Google Test version to latest release.
- bmo#1654332 - Add aarch64-make target to nss-try.
Update to NSS 3.60.1:
Notable changes in NSS 3.60:
- TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support has been added, replacing the previous ESNI (draft-ietf-tls-esni-01) implementation. See bmo#1654332 for more information.
- December 2020 batch of Root CA changes, builtins library updated to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769 for more information.
Update to NSS 3.59.1:
- bmo#1679290 - Fix potential deadlock with certain third-party PKCS11 modules
Update to NSS 3.59:
Notable changes:
- Exported two existing functions from libnss: CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData
Bugfixes
- bmo#1607449 - Lock cert->nssCertificate to prevent a potential data race
- bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
- bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
- bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
- bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed root certs when SHA1 signatures are disabled.
- bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to solve some test intermittents
- bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in our CVE-2020-25648 fix that broke purple-discord (boo#1179382)
- bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
- bmo#1667989 - Fix gyp linking on Solaris
- bmo#1668123 - Export CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData from libnss
- bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
- bmo#1663091 - Remove unnecessary assertions in the streaming ASN.1 decoder that affected decoding certain PKCS8 private keys when using NSS debug builds
- bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.
update to NSS 3.58
Bugs fixed:
- bmo#1641480 (CVE-2020-25648) Tighten CCS handling for middlebox compatibility mode.
- bmo#1631890 - Add support for Hybrid Public Key Encryption (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello (draft-ietf-tls-esni).
- bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto extensions.
- bmo#1668328 - Handle spaces in the Python path name when using gyp on Windows.
- bmo#1667153 - Add PK11_ImportDataKey for data object import.
- bmo#1665715 - Pass the embedded SCT list extension (if present) to TrustDomain::CheckRevocation instead of the notBefore value.
update to NSS 3.57
- The following CA certificates were Added: bmo#1663049 - CN=Trustwave Global Certification Authority SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8 bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4 bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
- The following CA certificates were Removed: bmo#1651211 - CN=EE Certification Centre Root CA SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76 bmo#1656077 - O=Government Root Certification Authority; C=TW SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
- Trust settings for the following CA certificates were Modified: bmo#1653092 - CN=OISTE WISeKey Global Root GA CA Websites (server authentication) trust bit removed.
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes
update to NSS 3.56
Notable changes
- bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
- bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
- bmo#1654142 - Add CPU feature detection for Intel SHA extension.
- bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
- bmo#1656986 - Properly detect arm64 during GYP build architecture detection.
- bmo#1652729 - Add build flag to disable RC2 and relocate to lib/freebl/deprecated.
- bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
- bmo#1588941 - Send empty certificate message when scheme selection fails.
- bmo#1652032 - Fix failure to build in Windows arm64 makefile cross-compilation.
- bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
- bmo#1653975 - Fix 3.53 regression by setting 'all' as the default makefile target.
- bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
- bmo#1659814 - Fix interop.sh failures with newer tls-interop commit and dependencies.
- bmo#1656519 - NSPR dependency updated to 4.28
update to NSS 3.55
Notable changes
- P384 and P521 elliptic curve implementations are replaced with verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
- PK11_FindCertInSlot is added. With this function, a given slot can be queried with a DER-Encoded certificate, providing performance and usability improvements over other mechanisms. (bmo#1649633)
- DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)
Relevant Bugfixes
- bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
- bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
- bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.
- bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part ChaCha20 (which was not functioning correctly) and more strictly enforce tag length.
- bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
- bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
- bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
- bmo#1653202 - Fix initialization bug in blapitest when compiled with NSS_DISABLE_DEPRECATED_SEED.
- bmo#1646594 - Fix AVX2 detection in makefile builds.
- bmo#1649633 - Add PK11_FindCertInSlot to search a given slot for a DER-encoded certificate.
- bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
- bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
- bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
- bmo#1649226 - Add Wycheproof ECDSA tests.
- bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
- bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in RSA_CheckSignRecover.
- bmo#1646324 - Advertise PKCS#1 schemes for certificates in the signature_algorithms extension.
update to NSS 3.54
Notable changes
-
Support for TLS 1.3 external pre-shared keys (bmo#1603042).
-
Use ARM Cryptography Extension for SHA256, when available (bmo#1528113)
-
The following CA certificates were Added: bmo#1645186 - certSIGN Root CA G2. bmo#1645174 - e-Szigno Root CA 2017. bmo#1641716 - Microsoft ECC Root Certificate Authority 2017. bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
-
The following CA certificates were Removed: bmo#1645199 - AddTrust Class 1 CA Root. bmo#1645199 - AddTrust External CA Root. bmo#1641718 - LuxTrust Global Root 2. bmo#1639987 - Staat der Nederlanden Root CA - G2. bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4. bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4. bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.
-
A number of certificates had their Email trust bit disabled. See bmo#1618402 for a complete list.
Bugs fixed
- bmo#1528113 - Use ARM Cryptography Extension for SHA256.
- bmo#1603042 - Add TLS 1.3 external PSK support.
- bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
- bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.
- bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.
- bmo#1641716 - Add Microsoft's non-EV root certificates.
- bmo1621151 - Disable email trust bit for 'O=Government Root Certification Authority; C=TW' root.
- bmo#1645199 - Remove AddTrust root certificates.
- bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.
- bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root certificate.
- bmo#1618402 - Remove Symantec root certificates and disable email trust bit.
- bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
- bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
- bmo#1642153 - Fix infinite recursion building NSS.
- bmo#1642638 - Fix fuzzing assertion crash.
- bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
- bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
- bmo#1643557 - Fix numerous compile warnings in NSS.
- bmo#1644774 - SSL gtests to use ClearServerCache when resetting self-encrypt keys.
- bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
- bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.
Список пакетов
HPE Helion OpenStack 8
Image SLES12-SP4-Azure-BYOS
Image SLES12-SP4-EC2-HVM-BYOS
Image SLES12-SP4-GCE-BYOS
Image SLES12-SP4-SAP-Azure
Image SLES12-SP4-SAP-Azure-BYOS
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production
Image SLES12-SP4-SAP-EC2-HVM
Image SLES12-SP4-SAP-EC2-HVM-BYOS
Image SLES12-SP4-SAP-GCE
Image SLES12-SP4-SAP-GCE-BYOS
Image SLES12-SP5-Azure-BYOS
Image SLES12-SP5-Azure-Basic-On-Demand
Image SLES12-SP5-Azure-HPC-BYOS
Image SLES12-SP5-Azure-HPC-On-Demand
Image SLES12-SP5-Azure-SAP-BYOS
Image SLES12-SP5-Azure-SAP-On-Demand
Image SLES12-SP5-Azure-Standard-On-Demand
Image SLES12-SP5-EC2-BYOS
Image SLES12-SP5-EC2-ECS-On-Demand
Image SLES12-SP5-EC2-On-Demand
Image SLES12-SP5-EC2-SAP-BYOS
Image SLES12-SP5-EC2-SAP-On-Demand
Image SLES12-SP5-GCE-BYOS
Image SLES12-SP5-GCE-On-Demand
Image SLES12-SP5-GCE-SAP-BYOS
Image SLES12-SP5-GCE-SAP-On-Demand
Image SLES12-SP5-OCI-BYOS-BYOS
Image SLES12-SP5-OCI-BYOS-SAP-BYOS
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
SUSE Linux Enterprise Server 12 SP2-BCL
SUSE Linux Enterprise Server 12 SP3-BCL
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server 12 SP4-LTSS
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server for SAP Applications 12 SP3
SUSE Linux Enterprise Server for SAP Applications 12 SP4
SUSE Linux Enterprise Server for SAP Applications 12 SP5
SUSE Linux Enterprise Software Development Kit 12 SP5
SUSE OpenStack Cloud 8
SUSE OpenStack Cloud 9
SUSE OpenStack Cloud Crowbar 8
SUSE OpenStack Cloud Crowbar 9
Ссылки
- Link for SUSE-RU-2021:3116-1
- E-Mail link for SUSE-RU-2021:3116-1
- SUSE Security Ratings
- SUSE Bug 1029961
- SUSE Bug 1174697
- SUSE Bug 1176206
- SUSE Bug 1176934
- SUSE Bug 1179382
- SUSE Bug 1188891
- SUSE CVE CVE-2020-12400 page
- SUSE CVE CVE-2020-12401 page
- SUSE CVE CVE-2020-12403 page
- SUSE CVE CVE-2020-25648 page
- SUSE CVE CVE-2020-6829 page
Описание
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Затронутые продукты
Ссылки
- CVE-2020-12400
- SUSE Bug 1174763
- SUSE Bug 1175686
Описание
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Затронутые продукты
Ссылки
- CVE-2020-12401
- SUSE Bug 1174763
- SUSE Bug 1175686
Описание
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Затронутые продукты
Ссылки
- CVE-2020-12403
- SUSE Bug 1174763
Описание
A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
Затронутые продукты
Ссылки
- CVE-2020-25648
- SUSE Bug 1177917
Описание
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Затронутые продукты
Ссылки
- CVE-2020-6829
- SUSE Bug 1174763
- SUSE Bug 1175686