Bug 863285 - Rebase nss-util to 3.14
Rebase nss-util to 3.14
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: nss-util (Show other bugs)
6.4
Unspecified Unspecified
high Severity high
: rc
: ---
Assigned To: Elio Maldonado Batiz
Aleš Mareček
: Rebase
: 833480 (view as bug list)
Depends On: 863286
Blocks: 816394 837089 1022310
  Show dependency treegraph
 
Reported: 2012-10-04 20:14 EDT by Elio Maldonado Batiz
Modified: 2015-05-06 07:28 EDT (History)
5 users (show)

See Also:
Fixed In Version: nss-util-3.14.0.0-2.el6
Doc Type: Rebase: Bug Fixes and Enhancements
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-02-21 05:43:59 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)
Changes to rebase to 3.14 - based on private branch work (4.22 KB, patch)
2012-10-08 19:42 EDT, Elio Maldonado Batiz
rrelyea: review+
Details | Diff

  None (edit)
Description Elio Maldonado Batiz 2012-10-04 20:14:02 EDT
Description of problem: This is needed in order to rebase nss to 3.14 which in turn is needed in order to add TLS 1.1 support to nss. The driver is a corresponding request for mod_nss for Apache 2.2 on rhel-6.4. 


Version-Release number of selected component (if applicable): RHEL-6.4


How reproducible:


Steps to Reproduce:
1.
2.
3.
  
Actual results:


Expected results:


Additional info:
Comment 1 Elio Maldonado Batiz 2012-10-08 19:42:50 EDT
Created attachment 623802 [details]
Changes to rebase to 3.14 - based on private branch work
Comment 2 Bob Relyea 2012-10-08 19:52:44 EDT
Comment on attachment 623802 [details]
Changes to rebase to 3.14 - based on private branch work

r+ for RHEL 6
Comment 5 Kai Engert (:kaie) 2012-10-12 11:15:07 EDT
Built nss-util-3.14.0.0-1.el6
Comment 7 Karel Srot 2012-10-15 09:02:31 EDT
Hi,
could you please summarize changes since last build and point out some items that deserve to be tested (except TLS1.1?
Comment 8 Bob Relyea 2012-10-16 15:50:12 EDT
The changes to util include:

* a buffer overflow function in DER_GetInteger and DER_GetUInteger has been fixed. (calling these functions on a DER integer greater then sizeof(int) on the given platform should not fail).

* upstream as turned off MD5 by default. We should verify that we did not turn off md5 by default here in RHEL 6.

* Several new ciphers were added, but are not enabled since we did not update softoken, so normal NSS regression testing is sufficient.

* Several functions have been moved out of softoken into nss-util. These functions aren't used in RHEL 6 (since we didn't update softoken), so normall regression testing is sufficient here.

I'll leave it to Elio to add or correct anything on Wednesday.

bob
Comment 9 Elio Maldonado Batiz 2012-10-18 14:06:59 EDT
The only thing to add is that we are rebasing to nss-3.14 from nss-3.13.5 having skipped nss-3.13.6. The bugs fixed on 3.13.6 are listed with this query:
https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED;classification=Components;query_format=advanced;product=NSS;target_milestone=3.13.6;list_id=4708561
I don't see anything striking there. For RHEL-5.9 we rebased nss to 3.13.6 so a review of that test suite is worthwhile to pick up any tests you may have added there.
Comment 10 Karel Srot 2012-10-29 12:42:16 EDT
*** Bug 833480 has been marked as a duplicate of this bug. ***
Comment 11 Elio Maldonado Batiz 2013-01-09 16:25:23 EST
The nss-util-3.14.0.0-2.el6 build was to fix an inconsistency in the n-v-r tags in the sepc file, no code changes.
Comment 14 errata-xmlrpc 2013-02-21 05:43:59 EST
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2013-0445.html

Note You need to log in before you can comment on or make changes to this bug.