Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:14418-1

Опубликовано: 06 июл. 2020
Источник: suse-cvrf

Описание

Security update for mozilla-nspr, mozilla-nss

This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

  • CVE-2019-11745: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
  • CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
  • CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
  • CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
  • CVE-2019-11727: A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages.
  • Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
  • Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr was updated to version 4.25.

Список пакетов

SUSE Linux Enterprise Server 11 SP4-LTSS
libfreebl3-3.53.1-38.23.1
libfreebl3-32bit-3.53.1-38.23.1
libsoftokn3-3.53.1-38.23.1
libsoftokn3-32bit-3.53.1-38.23.1
mozilla-nspr-4.25-29.12.2
mozilla-nspr-32bit-4.25-29.12.2
mozilla-nspr-devel-4.25-29.12.2
mozilla-nss-3.53.1-38.23.1
mozilla-nss-32bit-3.53.1-38.23.1
mozilla-nss-certs-3.53.1-38.23.1
mozilla-nss-certs-32bit-3.53.1-38.23.1
mozilla-nss-devel-3.53.1-38.23.1
mozilla-nss-tools-3.53.1-38.23.1

Описание

A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.53.1-38.23.1

Ссылки

Описание

When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.53.1-38.23.1

Ссылки

Описание

In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.53.1-38.23.1

Ссылки

Описание

NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.53.1-38.23.1

Ссылки

Описание

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.53.1-38.23.1
SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.53.1-38.23.1

Ссылки
Уязвимость SUSE-SU-2020:14418-1