-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2864
     Moderate: nss and nspr security, bug fix, and enhancement update
                               31 July 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           nss
                   nspr
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 8
                   Red Hat Enterprise Linux WS/Desktop 8
Impact/Access:     Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
                   Reduced Security         -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-11729 CVE-2019-11727 CVE-2019-11719
                   CVE-2018-18508  

Reference:         ASB-2019.0191
                   ESB-2019.2834
                   ESB-2019.0683
                   ESB-2019.0619

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2019:1951

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: nss and nspr security, bug fix, and enhancement update
Advisory ID:       RHSA-2019:1951-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:1951
Issue date:        2019-07-30
CVE Names:         CVE-2018-18508 CVE-2019-11719 CVE-2019-11727 
                   CVE-2019-11729 
=====================================================================

1. Summary:

An update for nss and nspr is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

Network Security Services (NSS) is a set of libraries designed to support
the cross-platform development of security-enabled client and server
applications.

Netscape Portable Runtime (NSPR) provides platform independence for non-GUI
operating system facilities.

The following packages have been upgraded to a later upstream version: nss
(3.44.0), nspr (4.21.0). (BZ#1713187, BZ#1713188)

Security Fix(es):

* nss: NULL pointer dereference in several CMS functions resulting in a
denial of service (CVE-2018-18508)

* nss: Out-of-bounds read when importing curve25519 private key
(CVE-2019-11719)

* nss: Empty or malformed p256-ECDH public keys may trigger a segmentation
fault (CVE-2019-11729)

* nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* PQG verify fails when create DSA PQG parameters because the counts aren't
returned correctly. (BZ#1685325)

* zeroization of AES context missing (BZ#1719629)

* RSA Pairwise consistency test (BZ#1719630)

* FIPS updated for nss-softoken POST (BZ#1722373)

* DH/ECDH key tests missing for the PG parameters (BZ#1722374)

* NSS should implement continuous random test on it's seed data or use the
kernel AF_ALG interface for random (BZ#1725059)

* support setting supported signature algorithms in strsclnt utility
(BZ#1725110)

* certutil -F with no parameters is killed with segmentation fault message
(BZ#1725115)

* NSS: Support for IKE/IPsec typical PKIX usage so libreswan can use nss
without rejecting certs based on EKU (BZ#1725116)

* NSS should use getentropy() for seeding its RNG, not /dev/urandom. Needs
update to NSS 3.37 (BZ#1725117)

* Disable TLS 1.3 in FIPS mode (BZ#1725773)

* Wrong alert sent when client uses PKCS#1 signatures in TLS 1.3
(BZ#1728259)

* x25519 allowed in FIPS mode (BZ#1728260)

* post handshake authentication with selfserv does not work if
SSL_ENABLE_SESSION_TICKETS is set (BZ#1728261)

Enhancement(s):

* Move IKEv1 and IKEv2 KDF's from libreswan to nss-softkn (BZ#1719628)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, applications using NSS or NSPR (for example,
Firefox) must be restarted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1671310 - CVE-2018-18508 nss: NULL pointer dereference in several CMS functions resulting in a denial of service
1685325 - PQG verify fails when create DSA PQG parameters because the counts aren't returned correctly.
1719629 - zeroization of AES context missing [rhel-8.0.0.z]
1719630 - RSA Pairwise consistency test [rhel-8.0.0.z]
1722373 - FIPS updated for nss-softoken POST [rhel-8.0.0.z]
1722374 - DH/ECDH key tests missing for the PG parameters [rhel-8.0.0.z]
1725059 - NSS should implement continuous random test on it's seed data or use the kernel AF_ALG interface for random [rhel-8.0.0.z]
1725110 - support setting supported signature algorithms in strsclnt utility [rhel-8.0.0.z]
1725115 - certutil -F with no parameters is killed with segmentation fault message [rhel-8.0.0.z]
1725116 - NSS: Support for IKE/IPsec typical PKIX usage so libreswan can use nss without rejecting certs based on EKU [rhel-8.0.0.z]
1728259 - Wrong alert sent when client uses PKCS#1 signatures in TLS 1.3 [rhel-8.0.0.z]
1728260 - x25519 allowed in FIPS mode [rhel-8.0.0.z]
1728261 - post handshake authentication with selfserv does not work if SSL_ENABLE_SESSION_TICKETS is set [rhel-8.0.0.z]
1728436 - CVE-2019-11719 nss: Out-of-bounds read when importing curve25519 private key
1728437 - CVE-2019-11729 nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault
1730988 - CVE-2019-11727 nss: PKCS#1 v1.5 signatures can be used for TLS 1.3

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
nspr-4.21.0-2.el8_0.src.rpm
nss-3.44.0-7.el8_0.src.rpm

aarch64:
nspr-4.21.0-2.el8_0.aarch64.rpm
nspr-debuginfo-4.21.0-2.el8_0.aarch64.rpm
nspr-debugsource-4.21.0-2.el8_0.aarch64.rpm
nspr-devel-4.21.0-2.el8_0.aarch64.rpm
nss-3.44.0-7.el8_0.aarch64.rpm
nss-debuginfo-3.44.0-7.el8_0.aarch64.rpm
nss-debugsource-3.44.0-7.el8_0.aarch64.rpm
nss-devel-3.44.0-7.el8_0.aarch64.rpm
nss-softokn-3.44.0-7.el8_0.aarch64.rpm
nss-softokn-debuginfo-3.44.0-7.el8_0.aarch64.rpm
nss-softokn-devel-3.44.0-7.el8_0.aarch64.rpm
nss-softokn-freebl-3.44.0-7.el8_0.aarch64.rpm
nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.aarch64.rpm
nss-softokn-freebl-devel-3.44.0-7.el8_0.aarch64.rpm
nss-sysinit-3.44.0-7.el8_0.aarch64.rpm
nss-sysinit-debuginfo-3.44.0-7.el8_0.aarch64.rpm
nss-tools-3.44.0-7.el8_0.aarch64.rpm
nss-tools-debuginfo-3.44.0-7.el8_0.aarch64.rpm
nss-util-3.44.0-7.el8_0.aarch64.rpm
nss-util-debuginfo-3.44.0-7.el8_0.aarch64.rpm
nss-util-devel-3.44.0-7.el8_0.aarch64.rpm

ppc64le:
nspr-4.21.0-2.el8_0.ppc64le.rpm
nspr-debuginfo-4.21.0-2.el8_0.ppc64le.rpm
nspr-debugsource-4.21.0-2.el8_0.ppc64le.rpm
nspr-devel-4.21.0-2.el8_0.ppc64le.rpm
nss-3.44.0-7.el8_0.ppc64le.rpm
nss-debuginfo-3.44.0-7.el8_0.ppc64le.rpm
nss-debugsource-3.44.0-7.el8_0.ppc64le.rpm
nss-devel-3.44.0-7.el8_0.ppc64le.rpm
nss-softokn-3.44.0-7.el8_0.ppc64le.rpm
nss-softokn-debuginfo-3.44.0-7.el8_0.ppc64le.rpm
nss-softokn-devel-3.44.0-7.el8_0.ppc64le.rpm
nss-softokn-freebl-3.44.0-7.el8_0.ppc64le.rpm
nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.ppc64le.rpm
nss-softokn-freebl-devel-3.44.0-7.el8_0.ppc64le.rpm
nss-sysinit-3.44.0-7.el8_0.ppc64le.rpm
nss-sysinit-debuginfo-3.44.0-7.el8_0.ppc64le.rpm
nss-tools-3.44.0-7.el8_0.ppc64le.rpm
nss-tools-debuginfo-3.44.0-7.el8_0.ppc64le.rpm
nss-util-3.44.0-7.el8_0.ppc64le.rpm
nss-util-debuginfo-3.44.0-7.el8_0.ppc64le.rpm
nss-util-devel-3.44.0-7.el8_0.ppc64le.rpm

s390x:
nspr-4.21.0-2.el8_0.s390x.rpm
nspr-debuginfo-4.21.0-2.el8_0.s390x.rpm
nspr-debugsource-4.21.0-2.el8_0.s390x.rpm
nspr-devel-4.21.0-2.el8_0.s390x.rpm
nss-3.44.0-7.el8_0.s390x.rpm
nss-debuginfo-3.44.0-7.el8_0.s390x.rpm
nss-debugsource-3.44.0-7.el8_0.s390x.rpm
nss-devel-3.44.0-7.el8_0.s390x.rpm
nss-softokn-3.44.0-7.el8_0.s390x.rpm
nss-softokn-debuginfo-3.44.0-7.el8_0.s390x.rpm
nss-softokn-devel-3.44.0-7.el8_0.s390x.rpm
nss-softokn-freebl-3.44.0-7.el8_0.s390x.rpm
nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.s390x.rpm
nss-softokn-freebl-devel-3.44.0-7.el8_0.s390x.rpm
nss-sysinit-3.44.0-7.el8_0.s390x.rpm
nss-sysinit-debuginfo-3.44.0-7.el8_0.s390x.rpm
nss-tools-3.44.0-7.el8_0.s390x.rpm
nss-tools-debuginfo-3.44.0-7.el8_0.s390x.rpm
nss-util-3.44.0-7.el8_0.s390x.rpm
nss-util-debuginfo-3.44.0-7.el8_0.s390x.rpm
nss-util-devel-3.44.0-7.el8_0.s390x.rpm

x86_64:
nspr-4.21.0-2.el8_0.i686.rpm
nspr-4.21.0-2.el8_0.x86_64.rpm
nspr-debuginfo-4.21.0-2.el8_0.i686.rpm
nspr-debuginfo-4.21.0-2.el8_0.x86_64.rpm
nspr-debugsource-4.21.0-2.el8_0.i686.rpm
nspr-debugsource-4.21.0-2.el8_0.x86_64.rpm
nspr-devel-4.21.0-2.el8_0.i686.rpm
nspr-devel-4.21.0-2.el8_0.x86_64.rpm
nss-3.44.0-7.el8_0.i686.rpm
nss-3.44.0-7.el8_0.x86_64.rpm
nss-debuginfo-3.44.0-7.el8_0.i686.rpm
nss-debuginfo-3.44.0-7.el8_0.x86_64.rpm
nss-debugsource-3.44.0-7.el8_0.i686.rpm
nss-debugsource-3.44.0-7.el8_0.x86_64.rpm
nss-devel-3.44.0-7.el8_0.i686.rpm
nss-devel-3.44.0-7.el8_0.x86_64.rpm
nss-softokn-3.44.0-7.el8_0.i686.rpm
nss-softokn-3.44.0-7.el8_0.x86_64.rpm
nss-softokn-debuginfo-3.44.0-7.el8_0.i686.rpm
nss-softokn-debuginfo-3.44.0-7.el8_0.x86_64.rpm
nss-softokn-devel-3.44.0-7.el8_0.i686.rpm
nss-softokn-devel-3.44.0-7.el8_0.x86_64.rpm
nss-softokn-freebl-3.44.0-7.el8_0.i686.rpm
nss-softokn-freebl-3.44.0-7.el8_0.x86_64.rpm
nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.i686.rpm
nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.x86_64.rpm
nss-softokn-freebl-devel-3.44.0-7.el8_0.i686.rpm
nss-softokn-freebl-devel-3.44.0-7.el8_0.x86_64.rpm
nss-sysinit-3.44.0-7.el8_0.x86_64.rpm
nss-sysinit-debuginfo-3.44.0-7.el8_0.i686.rpm
nss-sysinit-debuginfo-3.44.0-7.el8_0.x86_64.rpm
nss-tools-3.44.0-7.el8_0.x86_64.rpm
nss-tools-debuginfo-3.44.0-7.el8_0.i686.rpm
nss-tools-debuginfo-3.44.0-7.el8_0.x86_64.rpm
nss-util-3.44.0-7.el8_0.i686.rpm
nss-util-3.44.0-7.el8_0.x86_64.rpm
nss-util-debuginfo-3.44.0-7.el8_0.i686.rpm
nss-util-debuginfo-3.44.0-7.el8_0.x86_64.rpm
nss-util-devel-3.44.0-7.el8_0.i686.rpm
nss-util-devel-3.44.0-7.el8_0.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-18508
https://access.redhat.com/security/cve/CVE-2019-11719
https://access.redhat.com/security/cve/CVE-2019-11727
https://access.redhat.com/security/cve/CVE-2019-11729
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=fQiK
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXUEl9GaOgq3Tt24GAQiDixAAi2bOLLYxVhtuFUYBBJeClOXUypGtDzLt
cgB//qVMVGYUCTaX1GInKExnyGnbbwjPuHscCYvVmYNw7SBPMgn5BpzlKgedm4BI
mMNjfwNa/czGB3OjDCruGMJn7nsgh1H05h6VlPCbZTMtOZYTmcjVxhlI4bht7B3I
JmnTiL1kTT4qJ3cAcE3q2Co1/e0knJddc0uYZxueVYkWgZNpUtdw6YtUAHSN4OQ8
hS5lq15YALcivwh6b1LdelgKb+hjEICSM6+13mypgM+1eE4+P66AX7oT6b+uDo9p
azsh6CqGUISw9bdaBdapTjs2t0IZ2X5/GdkkGnVxhIP/r5CoeAVhhpTUb00TLKw1
fsea3Al1rNeSN3v+NlR57L/aVrb+7+J04Syxb6ARBE4RF1TkhlljisTqSOU1LCWm
vfZ3gtvB04PQ3TzWfCDcfahG3KRCacgrYqgyEDBnuMiPBfmY4Ytrbau0v/sZF5Tf
aUuARYWDCz8BDIlTT4PwIiWwi6VrQSCD4QeiZeeBftOBW/ysLkcjmSwXZdd87KrM
NvT/x5SVFlR5yBpFBvRfCvnDdvptcLvGHBJuyNdzdtaYxOUScyNdVKYrb+lLm+2t
s34ZGSmobDcDflP68SeBpMpTnykR8XPxMKUPB49oxynIjFHuDBb+Bhn9mBYkmV6Y
c7paFxbARLA=
=8BIi
-----END PGP SIGNATURE-----