import nss-3.44.0-15.el8
This commit is contained in:
parent
2f9926f1ba
commit
fa8cce37ed
45
SOURCES/nss-3.44-fix-cmac-alignment-crash.patch
Normal file
45
SOURCES/nss-3.44-fix-cmac-alignment-crash.patch
Normal file
@ -0,0 +1,45 @@
|
||||
diff --git a/lib/freebl/cmac.c b/lib/freebl/cmac.c
|
||||
--- a/lib/freebl/cmac.c
|
||||
+++ b/lib/freebl/cmac.c
|
||||
@@ -22,7 +22,7 @@
|
||||
* add a new Context pointer to the cipher union with the correct type. */
|
||||
CMACCipher cipherType;
|
||||
union {
|
||||
- AESContext aes;
|
||||
+ AESContext *aes;
|
||||
} cipher;
|
||||
int blockSize;
|
||||
|
||||
@@ -62,7 +62,7 @@
|
||||
{
|
||||
if (ctx->cipherType == CMAC_AES) {
|
||||
unsigned int tmpOutputLen;
|
||||
- SECStatus rv = AES_Encrypt(&ctx->cipher.aes, output, &tmpOutputLen,
|
||||
+ SECStatus rv = AES_Encrypt(ctx->cipher.aes, output, &tmpOutputLen,
|
||||
ctx->blockSize, input, inputLen);
|
||||
|
||||
/* Assumption: AES_Encrypt (when in ECB mode) always returns an
|
||||
@@ -156,8 +156,9 @@
|
||||
|
||||
ctx->blockSize = AES_BLOCK_SIZE;
|
||||
ctx->cipherType = CMAC_AES;
|
||||
- if (AES_InitContext(&ctx->cipher.aes, key, key_len, NULL, NSS_AES, 1,
|
||||
- ctx->blockSize) != SECSuccess) {
|
||||
+ ctx->cipher.aes = AES_CreateContext(key, NULL, NSS_AES, 1, key_len,
|
||||
+ ctx->blockSize);
|
||||
+ if (ctx->cipher.aes == NULL) {
|
||||
return SECFailure;
|
||||
}
|
||||
|
||||
@@ -308,8 +309,8 @@
|
||||
return;
|
||||
}
|
||||
|
||||
- if (ctx->cipherType == CMAC_AES) {
|
||||
- AES_DestroyContext(&ctx->cipher.aes, PR_FALSE);
|
||||
+ if (ctx->cipherType == CMAC_AES && ctx->cipher.aes != NULL) {
|
||||
+ AES_DestroyContext(ctx->cipher.aes, PR_TRUE);
|
||||
}
|
||||
|
||||
/* Destroy everything in the context. This includes sensitive data in
|
||||
|
15
SOURCES/nss-3.44-fix-swapped-cmac.patch
Normal file
15
SOURCES/nss-3.44-fix-swapped-cmac.patch
Normal file
@ -0,0 +1,15 @@
|
||||
diff --git a/lib/util/pkcs11t.h b/lib/util/pkcs11t.h
|
||||
--- a/lib/util/pkcs11t.h
|
||||
+++ b/lib/util/pkcs11t.h
|
||||
@@ -898,8 +898,8 @@
|
||||
#define CKM_AES_CCM 0x00001088
|
||||
#define CKM_AES_CTS 0x00001089
|
||||
/* AES-CMAC values copied from v2.40 errata 1 header file */
|
||||
-#define CKM_AES_CMAC_GENERAL 0x0000108A
|
||||
-#define CKM_AES_CMAC 0x0000108B
|
||||
+#define CKM_AES_CMAC 0x0000108A
|
||||
+#define CKM_AES_CMAC_GENERAL 0x0000108B
|
||||
#define CKM_AES_XCBC_MAC 0x0000108C
|
||||
#define CKM_AES_XCBC_MAC_96 0x0000108D
|
||||
|
||||
|
@ -46,7 +46,7 @@ rpm.define(string.format("nss_release_tag NSS_%s_RTM",
|
||||
Summary: Network Security Services
|
||||
Name: nss
|
||||
Version: %{nss_version}
|
||||
Release: 14%{?dist}
|
||||
Release: 15%{?dist}
|
||||
License: MPLv2.0
|
||||
URL: http://www.mozilla.org/projects/security/pki/nss/
|
||||
Requires: nspr >= %{nspr_version}
|
||||
@ -154,6 +154,10 @@ Patch216: nss-3.44-kbkdf.patch
|
||||
Patch217: nss-3.44-kbkdf-update.patch
|
||||
Patch218: nss-3.44-encrypt-update.patch
|
||||
Patch219: nss-3.44-kbkdf-coverity.patch
|
||||
# Upstream: https://bugzilla.mozilla.org/show_bug.cgi?id=1611209
|
||||
Patch220: nss-3.44-fix-swapped-cmac.patch
|
||||
# Upstream: https://bugzilla.mozilla.org/show_bug.cgi?id=1610687
|
||||
Patch221: nss-3.44-fix-cmac-alignment-crash.patch
|
||||
|
||||
|
||||
%description
|
||||
@ -928,6 +932,10 @@ update-crypto-policies --no-reload &> /dev/null || :
|
||||
|
||||
|
||||
%changelog
|
||||
* Fri Jan 31 2020 Bob Relyea <rrelyea@redhat.com> - 3.44.0-15
|
||||
- Fix swapped CMAC PKCS #11 values.
|
||||
- Fix data alignment crash in CMAC.
|
||||
|
||||
* Tue Dec 3 2019 Bob Relyea <rrelyea@redhat.com> - 3.44.0-14
|
||||
- Fix coverify scan issue
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user