{"affected":[{"ecosystem_specific":{"binaries":[{"libfreebl3":"3.68-3.56.1","libfreebl3-hmac":"3.68-3.56.1","libsoftokn3":"3.68-3.56.1","libsoftokn3-hmac":"3.68-3.56.1","mozilla-nspr":"4.32-3.20.1","mozilla-nss":"3.68-3.56.1","mozilla-nss-certs":"3.68-3.56.1","mozilla-nss-tools":"3.68-3.56.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"mozilla-nspr","purl":"pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.32-3.20.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libfreebl3":"3.68-3.56.1","libfreebl3-hmac":"3.68-3.56.1","libsoftokn3":"3.68-3.56.1","libsoftokn3-hmac":"3.68-3.56.1","mozilla-nspr":"4.32-3.20.1","mozilla-nss":"3.68-3.56.1","mozilla-nss-certs":"3.68-3.56.1","mozilla-nss-tools":"3.68-3.56.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"mozilla-nss","purl":"pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.68-3.56.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for mozilla-nspr fixes the following issues:\n\nmozilla-nspr was updated to version 4.32:\n\n* implement new socket option PR_SockOpt_DontFrag\n* support larger DNS records by increasing the default buffer\n  size for DNS queries \n* Lock access to PRCallOnceType members in PR_CallOnce* for\n  thread safety bmo#1686138\n* PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get\n  information about the operating system build version.\n\n\nMozilla NSS was updated to version 3.68:\n\n* bmo#1713562 - Fix test leak.\n* bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.\n* bmo#1693206 - Implement PKCS8 export of ECDSA keys.\n* bmo#1712883 - DTLS 1.3 draft-43.\n* bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.\n* bmo#1713562 - Validate ECH public names.\n* bmo#1717610 - Add function to get seconds from epoch from pkix::Time.\n\nupdate to NSS 3.67\n\n* bmo#1683710 - Add a means to disable ALPN.\n* bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).\n* bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.\n* bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.\n* bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.\n\nupdate to NSS 3.66\n\n* bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.\n* bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.\n* bmo#1708307 - Remove Trustis FPS Root CA from NSS.\n* bmo#1707097 - Add Certum Trusted Root CA to NSS.\n* bmo#1707097 - Add Certum EC-384 CA to NSS.\n* bmo#1703942 - Add ANF Secure Server Root CA to NSS.\n* bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.\n* bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.\n* bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.\n* bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.\n* bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.\n* bmo#1709291 - Add VerifyCodeSigningCertificateChain.\n\nupdate to NSS 3.65\n\n* bmo#1709654 - Update for NetBSD configuration.\n* bmo#1709750 - Disable HPKE test when fuzzing.\n* bmo#1566124 - Optimize AES-GCM for ppc64le.\n* bmo#1699021 - Add AES-256-GCM to HPKE.\n* bmo#1698419 - ECH -10 updates.\n* bmo#1692930 - Update HPKE to final version.\n* bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.\n* bmo#1703936 - New coverity/cpp scanner errors.\n* bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.\n* bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.\n* bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.\n\nupdate to NSS 3.64\n\n* bmo#1705286 - Properly detect mips64.\n* bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and\n\t\tdisable_crypto_vsx.\n* bmo#1698320 - replace __builtin_cpu_supports('vsx') with\n\t\tppc_crypto_support() for clang.\n* bmo#1613235 - Add POWER ChaCha20 stream cipher vector\n\t\tacceleration.\n\nFixed in 3.63\n\n* bmo#1697380 - Make a clang-format run on top of helpful contributions.\n* bmo#1683520 - ECCKiila P384, change syntax of nested structs\n\t\tinitialization to prevent build isses with GCC 4.8.\n* bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual\n\t\tscalar multiplication.\n* bmo#1683520 - ECCKiila P521, change syntax of nested structs\n\t\tinitialization to prevent build isses with GCC 4.8.\n* bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual\n\t\tscalar multiplication.\n* bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.\n* bmo#1694214 - tstclnt can't enable middlebox compat mode.\n* bmo#1694392 - NSS does not work with PKCS #11 modules not supporting\n\t\tprofiles.\n* bmo#1685880 - Minor fix to prevent unused variable on early return.\n* bmo#1685880 - Fix for the gcc compiler version 7 to support setenv\n\t\twith nss build.\n* bmo#1693217 - Increase nssckbi.h version number for March 2021 batch\n\t\tof root CA changes, CA list version 2.48.\n* bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's\n\t\t'Chambers of Commerce' and 'Global Chambersign' roots.\n* bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.\n* bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.\n* bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.\n* bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs\n\t\tfrom NSS.\n* bmo#1687822 - Turn off Websites trust bit for the “Staat der\n\t\tNederlanden Root CA - G3” root cert in NSS.\n* bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce\n\t\tRoot - 2008' and 'Global Chambersign Root - 2008’.\n* bmo#1694291 - Tracing fixes for ECH.\n\nupdate to NSS 3.62\n\n* bmo#1688374 - Fix parallel build NSS-3.61 with make\n* bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()\n\t\tcan corrupt 'cachedCertTable'\n* bmo#1690583 - Fix CH padding extension size calculation\n* bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail\n* bmo#1690421 - Install packaged libabigail in docker-builds image\n* bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing\n* bmo#1674819 - Fixup a51fae403328, enum type may be signed\n* bmo#1681585 - Add ECH support to selfserv\n* bmo#1681585 - Update ECH to Draft-09\n* bmo#1678398 - Add Export/Import functions for HPKE context\n* bmo#1678398 - Update HPKE to draft-07\n\nupdate to NSS 3.61\n\n* bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key\n\t\tvalues under certain conditions.\n* bmo#1684300 - Fix default PBE iteration count when NSS is compiled\n\t\twith NSS_DISABLE_DBM.\n* bmo#1651411 - Improve constant-timeness in RSA operations.\n* bmo#1677207 - Upgrade Google Test version to latest release.\n* bmo#1654332 - Add aarch64-make target to nss-try.\n\nUpdate to NSS 3.60.1:\n\nNotable changes in NSS 3.60:\n* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support\n  has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)\n  implementation. See bmo#1654332 for more information.\n* December 2020 batch of Root CA changes, builtins library updated\n  to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769\n  for more information.\n\nUpdate to NSS 3.59.1:\n\n* bmo#1679290 - Fix potential deadlock with certain third-party\n\t\tPKCS11 modules\n\nUpdate to NSS 3.59:\n\nNotable changes:\n\n* Exported two existing functions from libnss:\n  CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData\n\nBugfixes\n\n* bmo#1607449 - Lock cert->nssCertificate to prevent a potential data race\n* bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA\n* bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent\n* bmo#1670835 - Support enabling and disabling signatures via Crypto Policy\n* bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed\n\t\troot certs when SHA1 signatures are disabled.\n* bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to\n\t\tsolve some test intermittents\n* bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in\n\t\tour CVE-2020-25648 fix that broke purple-discord\n\t\t(boo#1179382)\n* bmo#1666891 - Support key wrap/unwrap with RSA-OAEP\n* bmo#1667989 - Fix gyp linking on Solaris\n* bmo#1668123 - Export CERT_AddCertToListHeadWithData and\n\t\tCERT_AddCertToListTailWithData from libnss\n* bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA\n* bmo#1663091 - Remove unnecessary assertions in the streaming\n\t\tASN.1 decoder that affected decoding certain PKCS8\n\t\tprivate keys when using NSS debug builds\n*  bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.\n\nupdate to NSS 3.58\n\nBugs fixed:\n\n* bmo#1641480 (CVE-2020-25648)\n  Tighten CCS handling for middlebox compatibility mode.\n* bmo#1631890 - Add support for Hybrid Public Key Encryption\n  (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello\n  (draft-ietf-tls-esni).\n* bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto\n  extensions.\n* bmo#1668328 - Handle spaces in the Python path name when using\n  gyp on Windows.\n* bmo#1667153 - Add PK11_ImportDataKey for data object import.\n* bmo#1665715 - Pass the embedded SCT list extension (if present)\n  to TrustDomain::CheckRevocation instead of the notBefore value.\n\nupdate to NSS 3.57\n\n* The following CA certificates were Added:\n  bmo#1663049 - CN=Trustwave Global Certification Authority\n      SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8\n  bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority\n      SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4\n  bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority\n      SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097\n* The following CA certificates were Removed:\n  bmo#1651211 - CN=EE Certification Centre Root CA\n      SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76\n  bmo#1656077 - O=Government Root Certification Authority; C=TW\n      SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3\n* Trust settings for the following CA certificates were Modified:\n  bmo#1653092 - CN=OISTE WISeKey Global Root GA CA\n      Websites (server authentication) trust bit removed.\n* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes\n\nupdate to NSS 3.56\n\nNotable changes\n\n* bmo#1650702 - Support SHA-1 HW acceleration on ARMv8\n* bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.\n* bmo#1654142 - Add CPU feature detection for Intel SHA extension.\n* bmo#1648822 - Add stricter validation of DH keys in FIPS mode.\n* bmo#1656986 - Properly detect arm64 during GYP build architecture\n\t\tdetection.\n* bmo#1652729 - Add build flag to disable RC2 and relocate to\n\t\tlib/freebl/deprecated.\n* bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.\n* bmo#1588941 - Send empty certificate message when scheme selection\n\t\tfails.\n* bmo#1652032 - Fix failure to build in Windows arm64 makefile\n\t\tcross-compilation.\n* bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.\n* bmo#1653975 - Fix 3.53 regression by setting 'all' as the default\n\t\tmakefile target.\n* bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.\n* bmo#1659814 - Fix interop.sh failures with newer tls-interop\n\t\tcommit and dependencies.\n* bmo#1656519 - NSPR dependency updated to 4.28\n\nupdate to NSS 3.55\n\nNotable changes\n* P384 and P521 elliptic curve implementations are replaced with\n  verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].\n* PK11_FindCertInSlot is added. With this function, a given slot\n  can be queried with a DER-Encoded certificate, providing performance\n  and usability improvements over other mechanisms. (bmo#1649633)\n* DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)\n\nRelevant Bugfixes\n\n* bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and\n  P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.\n* bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.\n* bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.\n* bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part\n  ChaCha20 (which was not functioning correctly) and more strictly\n  enforce tag length.\n* bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).\n* bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).\n* bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).\n* bmo#1653202 - Fix initialization bug in blapitest when compiled\n  with NSS_DISABLE_DEPRECATED_SEED.\n* bmo#1646594 - Fix AVX2 detection in makefile builds.\n* bmo#1649633 - Add PK11_FindCertInSlot to search a given slot\n  for a DER-encoded certificate.\n* bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.\n* bmo#1647752 - Update DTLS 1.3 implementation to draft-38.\n* bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.\n* bmo#1649226 - Add Wycheproof ECDSA tests.\n* bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.\n* bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in\n  RSA_CheckSignRecover.\n* bmo#1646324 - Advertise PKCS#1 schemes for certificates in the\n  signature_algorithms extension.\n\nupdate to NSS 3.54\n\nNotable changes\n\n* Support for TLS 1.3 external pre-shared keys (bmo#1603042).\n* Use ARM Cryptography Extension for SHA256, when available\n  (bmo#1528113)\n* The following CA certificates were Added:\n  bmo#1645186 - certSIGN Root CA G2.\n  bmo#1645174 - e-Szigno Root CA 2017.\n  bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.\n  bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.\n* The following CA certificates were Removed:\n  bmo#1645199 - AddTrust Class 1 CA Root.\n  bmo#1645199 - AddTrust External CA Root.\n  bmo#1641718 - LuxTrust Global Root 2.\n  bmo#1639987 - Staat der Nederlanden Root CA - G2.\n  bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.\n  bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.\n  bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.\n\n* A number of certificates had their Email trust bit disabled.\n  See bmo#1618402 for a complete list.\n\nBugs fixed\n\n* bmo#1528113 - Use ARM Cryptography Extension for SHA256.\n* bmo#1603042 - Add TLS 1.3 external PSK support.\n* bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.\n* bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.\n* bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.\n* bmo#1641716 - Add Microsoft's non-EV root certificates.\n* bmo1621151 - Disable email trust bit for 'O=Government\n\t       Root Certification Authority; C=TW' root.\n* bmo#1645199 - Remove AddTrust root certificates.\n* bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.\n* bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root\n\t\tcertificate.\n* bmo#1618402 - Remove Symantec root certificates and disable email trust\n\t\tbit.\n* bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.\n* bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.\n* bmo#1642153 - Fix infinite recursion building NSS.\n* bmo#1642638 - Fix fuzzing assertion crash.\n* bmo#1642871 - Enable SSL_SendSessionTicket after resumption.\n* bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.\n* bmo#1643557 - Fix numerous compile warnings in NSS.\n* bmo#1644774 - SSL gtests to use ClearServerCache when resetting\n\t\tself-encrypt keys.\n* bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.\n* bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.\n","id":"SUSE-RU-2021:3115-2","modified":"2021-09-21T14:38:27Z","published":"2021-09-21T14:38:27Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/-2021-3115/suse-ru-20213115-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1029961"},{"type":"REPORT","url":"https://bugzilla.suse.com/1174697"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176206"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176934"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179382"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188891"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-12400"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-12401"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-12403"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25648"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6829"}],"related":["CVE-2020-12400","CVE-2020-12401","CVE-2020-12403","CVE-2020-25648","CVE-2020-6829"],"summary":"Recommended update for mozilla-nspr, mozilla-nss","upstream":["CVE-2020-12400","CVE-2020-12401","CVE-2020-12403","CVE-2020-25648","CVE-2020-6829"]}