----- Original Message -----
From: "Eric H. Christensen" <spa...@fedoraproject.org>
To: devel-annou...@lists.fedoraproject.org
Sent: Wednesday, October 16, 2013 1:33:06 PM
Subject: BEAST to be patched in NSS

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

FESCo met today to address the NSS BEAST patch that left all software using NSS 
vulnerable to the BEAST[0] vulnerability.  The decision was made to implement 
the patch that fixes this vulnerablity in F19 and F20.  There are some programs 
that may have difficulties with this fix.  While the fix will go in as soon as 
possible the change in F19 will not be applied until some testing has been 
completed.

Information on this fix is in Bugzilla[1].  If your package depends on NSS you 
should definitely test this patch before it goes live in order to determine if 
it breaks functionality (information on the BZ ticket on how to disable the fix 
if needed).

[0] https://en.wikipedia.org/wiki/BEAST_%28computer_security%29#BEAST_attack
[1] https://bugzilla.mozilla.org/show_bug.cgi?id=665814

- -- Eric

No one in the NSS team was consulted on this. I usually monitor the FESCO 
meetings announcements but missed this. 

BEAST has been addressed in NSS back on 3.13. Because breakage of applications, 
many have since fixed, we decided to override the upstream defaults for fedora 
stable branches while preserving them on Rawhide. Several times I have asked in 
the fedora-devel for feedback and have been told clients still have problems as 
there as sill unpatched servers out there. This time around I didn't ask and 
should have done so. 

All we have to do in fedorais what we current do for Rawhide. This disable a 
patch or remove it altogether.

Below I have pasted a diff of the nss.spec file Rawihide versus f20.

-- Elio

----------------------------------------------------------
--- ../master/nss.spec  2013-10-04 15:51:01.719885419 -0700
+++ nss.spec    2013-10-03 15:32:32.282352192 -0700
@@ -93,7 +93,7 @@
 # Needed only when freebl on tree has new APIS
 Patch25:          nsspem-use-system-freebl.patch
 # This patch is currently meant for stable branches
-# Patch29:          nss-ssl-cbc-random-iv-off-by-default.patch
+Patch29:          nss-ssl-cbc-random-iv-off-by-default.patch
 # Prevent users from trying to enable ssl pkcs11 bypass
 # Patch39:          nss-ssl-enforce-no-pkcs11-bypass.path
 # TODO: Remove this patch when the ocsp test are fixed
@@ -105,7 +105,7 @@
 Patch46:          disable-ocsp-stapling-tests.patch
 # Fedora / RHEL-only patch, the templates directory was originally introduced 
to support mod_revocator
 Patch47:          utilwrap-include-templates.patch
-# Upstream: https://bugzilla.mozilla.org/show_bug.cgi?id=902171
+# TODO submit this patch upstream
 Patch48:          nss-versus-softoken-tests.patch
 # TODO remove when we switch to building nss without softoken
 Patch49:          nss-skip-bltest-and-fipstest.patch
@@ -194,7 +194,7 @@
 # link pem against buildroot's freebl, essential when mixing and matching
 %patch25 -p0 -b .systemfreebl
 # activate for stable and beta branches
-# %%patch29 -p0 -b .cbcrandomivoff
+%patch29 -p0 -b .cbcrandomivoff
 # %%patch39 -p0 -b .nobypass
 %patch40 -p0 -b .noocsptest
 %patch44 -p1 -b .syncupwithupstream
@@ -758,6 +758,7 @@
 * Thu Sep 26 2013 Elio Maldonado <emald...@redhat.com> - 3.15.2-1
 - Update to NSS_3_15_2_RTM
 - Update iquote.patch on account of modified prototype on cert.h installed by 
nss-devel
+- Keep the nss-ssl-cbc-random-iv-off-by-default.patch enabled
 
 * Wed Aug 28 2013 Elio Maldonado <emald...@redhat.com> - 3.15.1-7
 - Update pem sources to pick up a patch applied upstream which a faulty merge 
had missed

-----------------------------------------------------------------------------------------
- --------------------------------------------------
Eric "Sparks" Christensen
Fedora Project

spa...@fedoraproject.org - spa...@redhat.com
097C 82C3 52DF C64A 50C2  E3A3 8076 ABDE 024B B3D1
- --------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
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=YObr
-----END PGP SIGNATURE-----
_______________________________________________
devel-announce mailing list
devel-annou...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Reply via email to