安全公告详情

NS-SA-2021-0156

2021-09-24 11:21:19

简介

moderate: nss/qt5-qtbase security update

严重级别

moderate

主题

An update for nss/qt5-qtbase is now available for NewStart CGSL MAIN 5.05/CGSL CORE 5.05.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

nss: Header and Library files for doing development with Network Security Services.
qt5-qtbase: Common files for Qt5.


Security Fix(es):
nss: A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.(CVE-2019-11727)
nss: When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.(CVE-2019-11719)
nss: A protocol downgrade flaw was found in Network Security Services (NSS). After a HelloRetryRequest has been sent, the client may negotiate a lower protocol than TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.(CVE-2019-17023)
nss: A flaw was found in NSS, where it is vulnerable to RSA key generation cache timing side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. The highest threat to this flaw is to confidentiality.(CVE-2020-12402)
nss: A flaw was found in nss. Using the EM side-channel, it is possible to extract the position of zero and non-zero wNAF digits while nss-certutil tool performs scalar multiplication during the ECDSA signature generation, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.(CVE-2020-6829)
nss: A flaw was found in nss. Using the EM side-channel, it is possible to extract the position of zero and non-zero wNAF digits while nss-certutil tool performs scalar multiplication during the ECDSA signature generation, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.(CVE-2020-12401)
nss: A side-channel flaw was found in NSS, in the way P-384 and P-521 curves are used in the generation of EDSA signatures, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.(CVE-2020-12400)
nss: A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.(CVE-2020-12403)
nss: A vulnerability was discovered in nss where input text length was not checked when using certain cryptographic primitives. This could lead to a heap-buffer overflow resulting in a crash and data leak. The highest threat is to confidentiality and integrity of data as well as system availability.(CVE-2019-17006)
nss: A use-after-free flaw was found in Mozilla Network Security Services (NSS) related to PK11 session handling. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled with NSS.(CVE-2019-11756)
nss: bugfix
qt5-qtbase: An issue was discovered in Qt through 5.12.9, and 5.13.x through 5.15.x before 5.15.1. read_xbm_body in gui/image/qxbmhandler.cpp has a buffer over-read.(CVE-2020-17507)
qt5-qtbase: Uncontrolled search path in the QT Library before 5.14.0, 5.12.7 and 5.9.10 may allow an authenticated user to potentially enable elevation of privilege via local access.(CVE-2020-0570)
qt5-qtbase: Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.(CVE-2020-0569)
qt5-qtbase: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.05.F11B5.

影响组件

  • nss
  • qt5-qtbase

影响产品

  • CGSL MAIN 5.05
  • CGSL CORE 5.05

更新包

{"fix":[{"product":"CGSL MAIN 5.05","pkgs":[{"binary":["nss-3.53.1-3.el7.cgslv5_5.0.1.g3b7ac85.x86_64.rpm","nss-sysinit-3.53.1-3.el7.cgslv5_5.0.1.g3b7ac85.x86_64.rpm","nss-devel-3.53.1-3.el7.cgslv5_5.0.1.g3b7ac85.x86_64.rpm","nss-pkcs11-devel-3.53.1-3.el7.cgslv5_5.0.1.g3b7ac85.x86_64.rpm","nss-tools-3.53.1-3.el7.cgslv5_5.0.1.g3b7ac85.x86_64.rpm"],"source":"nss-3.53.1-3.el7.cgslv5_5.0.1.g3b7ac85.src.rpm"},{"binary":["qt5-qtbase-common-5.9.7-5.el7_9.noarch.rpm","qt5-qtbase-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-static-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-devel-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-examples-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-gui-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-mysql-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-doc-5.9.7-5.el7_9.x86_64.rpm","qt5-rpm-macros-5.9.7-5.el7_9.noarch.rpm","qt5-qtbase-odbc-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-postgresql-5.9.7-5.el7_9.x86_64.rpm"],"source":"qt5-qtbase-5.9.7-5.el7_9.src.rpm"}]},{"product":"CGSL CORE 5.05","pkgs":[{"binary":["nss-tools-3.53.1-3.el7.cgslv5_5.0.2.g68c96f6.lite.x86_64.rpm","nss-sysinit-3.53.1-3.el7.cgslv5_5.0.2.g68c96f6.lite.x86_64.rpm","nss-3.53.1-3.el7.cgslv5_5.0.2.g68c96f6.lite.x86_64.rpm","nss-devel-3.53.1-3.el7.cgslv5_5.0.2.g68c96f6.lite.x86_64.rpm","nss-pkcs11-devel-3.53.1-3.el7.cgslv5_5.0.2.g68c96f6.lite.x86_64.rpm"],"source":"nss-3.53.1-3.el7.cgslv5_5.0.2.g68c96f6.lite.src.rpm"},{"binary":["qt5-qtbase-common-5.9.7-5.el7_9.noarch.rpm","qt5-qtbase-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-static-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-devel-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-examples-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-gui-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-mysql-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-doc-5.9.7-5.el7_9.x86_64.rpm","qt5-rpm-macros-5.9.7-5.el7_9.noarch.rpm","qt5-qtbase-odbc-5.9.7-5.el7_9.x86_64.rpm","qt5-qtbase-postgresql-5.9.7-5.el7_9.x86_64.rpm"],"source":"qt5-qtbase-5.9.7-5.el7_9.src.rpm"}]}]}

CVE

参考