[openldap/f16] fix: default cipher suite is always selected
jvcelak
jvcelak at fedoraproject.org
Wed Jun 27 15:22:30 UTC 2012
commit 18c50b131ecfd21fa2d3930bdacb5d750f297b5b
Author: Jan Vcelak <jvcelak at redhat.com>
Date: Wed Jun 27 14:10:28 2012 +0200
fix: default cipher suite is always selected
Resolves: #828790
...-nss-default-cipher-suite-always-selected.patch | 34 ++++++++++++++++++++
openldap.spec | 3 ++
2 files changed, 37 insertions(+), 0 deletions(-)
---
diff --git a/openldap-nss-default-cipher-suite-always-selected.patch b/openldap-nss-default-cipher-suite-always-selected.patch
new file mode 100644
index 0000000..10c3523
--- /dev/null
+++ b/openldap-nss-default-cipher-suite-always-selected.patch
@@ -0,0 +1,34 @@
+MozNSS: default cipher suite always selected
+
+Author: Tim Strobell <tim.strobell.ctr at nrl.navy.mil>
+Upstream ITS: #7285
+Upstream commit: 2c2bb2e7aee1b2167f383a8344985a1cf66aff3f
+Resolves: #828790
+
+diff --git a/libraries/libldap/tls_m.c b/libraries/libldap/tls_m.c
+index 23d843c..b608551 100644
+--- a/libraries/libldap/tls_m.c
++++ b/libraries/libldap/tls_m.c
+@@ -2218,12 +2218,13 @@ tlsm_deferred_ctx_init( void *arg )
+ return -1;
+ }
+
+- if ( lt->lt_ciphersuite &&
+- tlsm_parse_ciphers( ctx, lt->lt_ciphersuite )) {
+- Debug( LDAP_DEBUG_ANY,
+- "TLS: could not set cipher list %s.\n",
+- lt->lt_ciphersuite, 0, 0 );
+- return -1;
++ if ( lt->lt_ciphersuite ) {
++ if ( tlsm_parse_ciphers( ctx, lt->lt_ciphersuite ) ) {
++ Debug( LDAP_DEBUG_ANY,
++ "TLS: could not set cipher list %s.\n",
++ lt->lt_ciphersuite, 0, 0 );
++ return -1;
++ }
+ } else if ( tlsm_parse_ciphers( ctx, "DEFAULT" ) ) {
+ Debug( LDAP_DEBUG_ANY,
+ "TLS: could not set cipher list DEFAULT.\n",
+--
+1.7.10.4
+
diff --git a/openldap.spec b/openldap.spec
index 3c9c416..91237fe 100644
--- a/openldap.spec
+++ b/openldap.spec
@@ -48,6 +48,7 @@ Patch22: openldap-ld_defconn-rebind.patch
Patch23: openldap-nss-dont-overwrite-verify-cert-error.patch
Patch24: openldap-nss-clean-memory-for-token-pin.patch
Patch25: openldap-cve-nss-cipher-suite-ignored.patch
+Patch26: openldap-nss-default-cipher-suite-always-selected.patch
# patches for the evolution library (see README.evolution)
Patch200: openldap-evolution-ntlm.patch
@@ -166,6 +167,7 @@ pushd openldap-%{version}
%patch23 -p1 -b .nss-dont-overwrite-verify-cert-error
%patch24 -p1 -b .nss-clean-memory-for-token-pin
%patch25 -p1 -b .cve-nss-cipher-suite-ignored
+%patch26 -p1 -b .nss-default-cipher-suite-always-selected
cp %{_datadir}/libtool/config/config.{sub,guess} build/
@@ -695,6 +697,7 @@ exit 0
- fix: TLS error messages overwriting in tlsm_verify_cert() (#810462)
- fix: reading pin from file can make all TLS connections hang (#829317)
- CVE-2012-2668: cipher suite selection by name can be ignored (#825875)
+- fix: default cipher suite is always selected (#828790)
* Mon Mar 26 2012 Jan Synáček <jsynacek at redhat.com> 2.4.26-7
- fix: Re-binding to a failed connection can segfault (#784989)
More information about the scm-commits
mailing list