| Summary: | Enhance PSM's key generation strategy with tokens/escrow | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 5 | Reporter: | Andrew Wnuk <awnuk> | ||||
| Component: | xulrunner | Assignee: | Martin Stransky <stransky> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Desktop QE <desktop-qa-list> | ||||
| Severity: | high | Docs Contact: | |||||
| Priority: | urgent | ||||||
| Version: | 5.8 | CC: | cfu, dpal, jpallich, jrieden, kchamart, kengert, nkinder, rrelyea, shaines, tpelka, vbenes | ||||
| Target Milestone: | rc | Keywords: | OtherQA, ZStream | ||||
| Target Release: | --- | ||||||
| Hardware: | Unspecified | ||||||
| OS: | Unspecified | ||||||
| Whiteboard: | OtherQA=cfu@redhat.com | ||||||
| Fixed In Version: | RHSA-2012:0515 | Doc Type: | Bug Fix | ||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | |||||||
| : | 805642 (view as bug list) | Environment: | |||||
| Last Closed: | 2012-05-04 10:22:30 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Bug Depends On: | |||||||
| Bug Blocks: | 805642, 811205 | ||||||
| Attachments: |
|
||||||
|
Description
Andrew Wnuk
2012-03-21 17:50:57 UTC
This bug requests that "patch v4" (r=rrelyea) from upstream bug https://bugzilla.mozilla.org/show_bug.cgi?id=681937 gets added to Firefox (but I believe the relevant code lives in our xulrunner RPM package). The full link to the patch is https://bugzilla.mozilla.org/attachment.cgi?id=588982&action=edit This patch applies fine on the latest Firefox 10.x branch. We propose that this patch gets added together with the next scheduled FF update (10.0.4) (sharing a single errata). Created attachment 572018 [details]
Patch v4 from upstream (smaller context version)
This is the same patch as upstream, however, with less context (5 lines, not 50 lines, shortens the patch, increases likelyhood that patch will continue to apply).
If you need a risk assessment: The patch is limited to changing code related to certificate key pair generation (which is only called when a user visits a CA's web page to apply for a certificate). *** Bug 672316 has been marked as a duplicate of this bug. *** Fixed in RHSA-2012:0515. |