[nss/f16] - Resolves: Bug 784672 - nss should protect against being called before nss_Init - cherry-picked nss
Elio Maldonado
emaldonado at fedoraproject.org
Fri Jan 27 00:23:49 UTC 2012
commit 8f2b69b56c6d8e164a2e881667b99b7e57443ff3
Author: Elio Maldonado <emaldona at redhat.com>
Date: Thu Jan 26 14:56:36 2012 -0800
- Resolves: Bug 784672 - nss should protect against being called before nss_Init
- cherry-picked nss.pec changes from f16
...672-protect-against-calls-before-nss_init.patch | 40 ++++++++++++++++++++
nss.spec | 7 +++-
2 files changed, 46 insertions(+), 1 deletions(-)
---
diff --git a/bz784672-protect-against-calls-before-nss_init.patch b/bz784672-protect-against-calls-before-nss_init.patch
new file mode 100644
index 0000000..934ea30
--- /dev/null
+++ b/bz784672-protect-against-calls-before-nss_init.patch
@@ -0,0 +1,40 @@
+diff -up mozilla/security/nss/lib/nss/nssinit.c.784672 mozilla/security/nss/lib/nss/nssinit.c
+--- mozilla/security/nss/lib/nss/nssinit.c.784672 2012-01-26 14:43:46.232357231 -0800
++++ mozilla/security/nss/lib/nss/nssinit.c 2012-01-26 14:50:55.830512565 -0800
+@@ -944,6 +944,12 @@ NSS_RegisterShutdown(NSS_ShutdownFunc sF
+ {
+ int i;
+
++ /* make sure our lock and condition variable are initialized one and only
++ * one time */
++ if (PR_CallOnce(&nssInitOnce, nss_doLockInit) != PR_SUCCESS) {
++ return SECFailure;
++ }
++
+ PZ_Lock(nssInitLock);
+ if (!NSS_IsInitialized()) {
+ PZ_Unlock(nssInitLock);
+@@ -1002,6 +1008,11 @@ NSS_UnregisterShutdown(NSS_ShutdownFunc
+ {
+ int i;
+
++ /* make sure our lock and condition variable are initialized one and only
++ * one time */
++ if (PR_CallOnce(&nssInitOnce, nss_doLockInit) != PR_SUCCESS) {
++ return SECFailure;
++ }
+ PZ_Lock(nssInitLock);
+ if (!NSS_IsInitialized()) {
+ PZ_Unlock(nssInitLock);
+@@ -1192,6 +1203,11 @@ NSS_ShutdownContext(NSSInitContext *cont
+ {
+ SECStatus rv = SECSuccess;
+
++ /* make sure our lock and condition variable are initialized one and only
++ * one time */
++ if (PR_CallOnce(&nssInitOnce, nss_doLockInit) != PR_SUCCESS) {
++ return SECFailure;
++ }
+ PZ_Lock(nssInitLock);
+ /* If one or more threads are in the middle of init, wait for them
+ * to complete */
diff --git a/nss.spec b/nss.spec
index 88abe25..701b206 100644
--- a/nss.spec
+++ b/nss.spec
@@ -7,7 +7,7 @@
Summary: Network Security Services
Name: nss
Version: 3.13.1
-Release: 10%{?dist}
+Release: 11%{?dist}
License: MPLv1.1 or GPLv2+ or LGPLv2+
URL: http://www.mozilla.org/projects/security/pki/nss/
Group: System Environment/Libraries
@@ -71,6 +71,7 @@ Patch26: nofipstest.patch
# include this patch in the upstream pem review
Patch28: nsspem-bz754771.patch
Patch29: nss-ssl-cbc-random-iv-off-by-default.patch
+Patch30: bz784672-protect-against-calls-before-nss_init.patch
%description
@@ -160,6 +161,7 @@ low level services.
%patch26 -p0 -b .nofipstest
%patch28 -p0 -b .754771
%patch29 -p0 -b .770682
+%patch30 -p0 -b .784672
%build
@@ -574,6 +576,9 @@ rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/nsslowhash.h
%changelog
+* Thu Jan 26 2012 Elio Maldonado <emaldona at redhat.com> - 3.13.1-12
+- Resolves: Bug 784672 - nss should protect against being called before nss_Init
+
* Fri Jan 06 2012 Elio Maldonado <emaldona at redhat.com> - 3.13.1-10
- Resolves: Bug 770682 - nss update breaks pidgin-sipe connectivity
- NSS_SSL_CBC_RANDOM_IV set to 0 by default and changed to 1 on user request
More information about the scm-commits
mailing list