diff --git a/clog b/clog new file mode 100644 index 0000000..5184c03 --- /dev/null +++ b/clog @@ -0,0 +1,9 @@ +Resolves: CVE-2013-4566, bz #1036940 + +- [mod_nss-nssverifyclient.patch] +- Bugzilla Bug #1037722 - CVE-2013-4566 mod_nss: incorrect handling of + NSSVerifyClient in directory context [fedora-all] (rcritten) +- Bugzilla Bug #1037761 - mod_nss does not respect `NSSVerifyClient` in + Directory (rcritten) +- [mod_nss-usecases.patch] +- Bugzilla Bug #1036940 - [DOC] making mod_nss work in FIPS mode (mharmsen) diff --git a/mod_nss-nssverifyclient.patch b/mod_nss-nssverifyclient.patch new file mode 100644 index 0000000..d9858c3 --- /dev/null +++ b/mod_nss-nssverifyclient.patch @@ -0,0 +1,12 @@ +diff -rupN mod_nss-1.0.8.patched/nss_engine_kernel.c mod_nss-1.0.8.989724/nss_engine_kernel.c +--- mod_nss-1.0.8.patched/nss_engine_kernel.c 2007-05-31 14:36:03.000000000 -0700 ++++ mod_nss-1.0.8.989724/nss_engine_kernel.c 2013-10-25 13:32:47.000000000 -0700 +@@ -275,7 +275,7 @@ int nss_hook_Access(request_rec *r) + + if (verify == SSL_CVERIFY_REQUIRE) { + SSL_OptionSet(ssl, SSL_REQUEST_CERTIFICATE, PR_TRUE); +- SSL_OptionSet(ssl, SSL_REQUIRE_CERTIFICATE, SSL_REQUIRE_NO_ERROR); ++ SSL_OptionSet(ssl, SSL_REQUIRE_CERTIFICATE, SSL_REQUIRE_ALWAYS); + } else if (verify == SSL_CVERIFY_OPTIONAL) { + SSL_OptionSet(ssl, SSL_REQUEST_CERTIFICATE, PR_TRUE); + SSL_OptionSet(ssl, SSL_REQUIRE_CERTIFICATE, SSL_REQUIRE_NEVER); diff --git a/mod_nss-usecases.patch b/mod_nss-usecases.patch new file mode 100644 index 0000000..8427fe6 --- /dev/null +++ b/mod_nss-usecases.patch @@ -0,0 +1,322 @@ +diff -rupN mod_nss-1.0.8.srpm/docs/mod_nss.html mod_nss-1.0.8.patched/docs/mod_nss.html +--- mod_nss-1.0.8.srpm/docs/mod_nss.html 2013-11-27 12:03:05.000000000 -0800 ++++ mod_nss-1.0.8.patched/docs/mod_nss.html 2013-11-27 17:27:08.000000000 -0800 +@@ -33,6 +33,7 @@ + Database Management
+ Why is SSLv2 disabled?
+ Frequently Asked Questions
++Sample Use Cases
+ +

Introduction

+ The mod_ssl package was +@@ -1056,7 +1057,7 @@ man-in-the-middle attack so leaving this +
+ Example
+
+-NSSProcyCheckPeerCN on
++NSSProxyCheckPeerCN on
+
+ +

Environment Variables

+@@ -1467,6 +1468,300 @@ Q. Does mod_nss support mod_proxy?
+
+ A. Yes but you need to make sure that mod_ssl is not loaded. mod_proxy + provides a single interface for SSL providers and mod_nss defers to +-mod_ssl if it is loaded. ++mod_ssl if it is loaded.
++ ++

Sample Use Cases

++

I. Restart Apache using the NSS Internal Software Token

++ ++

II. Restart Apache using the NSS FIPS Software Token

++ + + diff --git a/mod_nss.spec b/mod_nss.spec index 6566260..1881009 100644 --- a/mod_nss.spec +++ b/mod_nss.spec @@ -6,7 +6,7 @@ Name: mod_nss Version: 1.0.8 -Release: 26%{?dist} +Release: 28%{?dist} Summary: SSL/TLS module for the Apache HTTP server Group: System Environment/Daemons License: ASL 2.0 @@ -50,6 +50,8 @@ Patch19: mod_nss-sslmultiproxy_2.patch Patch20: mod_nss-docs-fix.patch Patch21: mod_nss-SSLEngine-off.patch Patch22: mod_nss-unused-filter_ctx.patch +Patch23: mod_nss-nssverifyclient.patch +Patch24: mod_nss-usecases.patch %description The mod_nss module provides strong cryptography for the Apache Web @@ -86,6 +88,8 @@ security library. %patch20 -p1 -b .docs-fix %patch21 -p1 -b .SSLEngine-off %patch22 -p1 -b .unused-filter_ctx +%patch23 -p1 -b .nssverifyclient +%patch24 -p1 -b .usecases # Touch expression parser sources to prevent regenerating it touch nss_expr_*.[chyl] @@ -196,6 +200,16 @@ fi %{_sbindir}/gencert %changelog +* Tue Dec 3 2013 Rob Crittenden - 1.0.8-28 +- Resolves: CVE-2013-4566, bz #1036940 +- [mod_nss-nssverifyclient.patch] +- Bugzilla Bug #1037722 - CVE-2013-4566 mod_nss: incorrect handling of + NSSVerifyClient in directory context [fedora-all] (rcritten) +- Bugzilla Bug #1037761 - mod_nss does not respect `NSSVerifyClient` in + Directory (rcritten) +- [mod_nss-usecases.patch] +- Bugzilla Bug #1036940 - [DOC] making mod_nss work in FIPS mode (mharmsen) + * Tue Nov 12 2013 Joe Orton - 1.0.8-26 - [mod_nss-SSLEngine-off.patch] - Bugzilla Bug #1029043 - Implicit SSLEngine for 443 port breaks mod_nss @@ -209,7 +223,7 @@ fi * Mon Oct 21 2013 Matthew Harmsen - 1.0.8-24 - Bugzilla Bug #961471 - Port Downstream Patches Upstream (mharmsen) -- Add '--enable-ecc' option to '%configure' line under '%build' section of +- Add '--enable-ecc' option to %%configure line under %%build section of this spec file (mharmsen) - Bumped version build/runtime requirements for NSPR and NSS (mharmsen) - [mod_nss-PK11_ListCerts_2.patch]