Hello community, here is the log from the commit of package mozilla-nss checked in at Tue Aug 1 17:21:38 CEST 2006. -------- --- GNOME/mozilla-nss/mozilla-nss.changes 2006-07-01 23:39:12.000000000 +0200 +++ mozilla-nss/mozilla-nss.changes 2006-08-01 09:13:00.000000000 +0200 @@ -1,0 +2,6 @@ +Fri Jul 28 07:09:44 CEST 2006 - stark@suse.de + +- fixed usage of uninitialized pointers (uninit.patch) +- requires NSPR 4.6.2 + +------------------------------------------------------------------- New: ---- uninit.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ mozilla-nss.spec ++++++ --- /var/tmp/diff_new_pack.0S7NYD/_old 2006-08-01 17:21:15.000000000 +0200 +++ /var/tmp/diff_new_pack.0S7NYD/_new 2006-08-01 17:21:15.000000000 +0200 @@ -14,7 +14,7 @@ BuildRequires: gcc-c++ mozilla-nspr-devel License: MPL, GPL Version: 3.11.2 -Release: 1 +Release: 3 Summary: Network (Netscape) Security Services URL: http://www.mozilla.org/projects/security/pki/nss/ Group: System/Libraries @@ -23,6 +23,7 @@ Source2: addon-certs.txt Source3: nss-config.in Patch1: nss-opt.patch +Patch2: uninit.patch Patch3: system-nspr.patch PreReq: mozilla-nspr >= %( echo `rpm -q --queryformat '%{VERSION}' mozilla-nspr`) BuildRoot: %{_tmppath}/%{name}-%{version}-build @@ -79,6 +80,7 @@ %setup -n nss-%{version} -q cd mozilla %patch1 +%patch2 %patch3 # additional CA certificates #cd security/nss/lib/ckfw/builtins @@ -171,6 +173,9 @@ %exclude %{_bindir}/nss-config %changelog -n mozilla-nss +* Fri Jul 28 2006 - stark@suse.de +- fixed usage of uninitialized pointers (uninit.patch) +- requires NSPR 4.6.2 * Sat Jul 01 2006 - stark@suse.de - update to 3.11.2 RTM version * ECC not enabled but defines needed symbols ++++++ nss.pc.in ++++++ --- GNOME/mozilla-nss/nss.pc.in 2005-12-16 08:47:39.000000000 +0100 +++ mozilla-nss/nss.pc.in 2006-08-01 09:10:14.000000000 +0200 @@ -6,6 +6,6 @@ Name: NSS Description: Network Security Services Version: %VERSION% -Requires: nspr >= 4.6.1 +Requires: nspr >= 4.6.2 Libs: -Wl,-rpath-link,${libdir} -L${libdir} -lssl3 -lsmime3 -lnss3 Cflags: -I${includedir} ++++++ uninit.patch ++++++ Index: security/nss/cmd/fipstest/fipstest.c =================================================================== RCS file: /cvsroot/mozilla/security/nss/cmd/fipstest/fipstest.c,v retrieving revision 1.3.2.21 diff -u -p -r1.3.2.21 fipstest.c --- security/nss/cmd/fipstest/fipstest.c 25 Mar 2006 23:47:58 -0000 1.3.2.21 +++ security/nss/cmd/fipstest/fipstest.c 28 Jul 2006 05:09:07 -0000 @@ -2916,8 +2916,8 @@ void sha_test(char *reqfn) unsigned char seed[HASH_LENGTH_MAX]; /* max size of seed 64 bytes */ unsigned char MD[HASH_LENGTH_MAX]; /* message digest */ - FILE *req; /* input stream from the REQUEST file */ - FILE *resp; /* output stream to the RESPONSE file */ + FILE *req = NULL; /* input stream from the REQUEST file */ + FILE *resp; /* output stream to the RESPONSE file */ buf = PORT_ZAlloc(bufSize); if (buf == NULL) { @@ -3013,7 +3013,9 @@ void sha_test(char *reqfn) } } loser: - fclose(req); + if (req) { + fclose(req); + } if (buf) { PORT_ZFree(buf, bufSize); } @@ -3088,8 +3090,8 @@ void hmac_test(char *reqfn) unsigned char HMAC[HASH_LENGTH_MAX]; /* computed HMAC */ HASH_HashType hash_alg; /* HMAC type */ - FILE *req; /* input stream from the REQUEST file */ - FILE *resp; /* output stream to the RESPONSE file */ + FILE *req = NULL; /* input stream from the REQUEST file */ + FILE *resp; /* output stream to the RESPONSE file */ buf = PORT_ZAlloc(bufSize); if (buf == NULL) { @@ -3201,7 +3203,9 @@ void hmac_test(char *reqfn) } } loser: - fclose(req); + if (req) { + fclose(req); + } if (buf) { PORT_ZFree(buf, bufSize); } ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Remember to have fun...
participants (1)
-
root@suse.de