-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I propose a fix that closes #609124. Since this regression justifies a
new package I edited changelog as well, a maintainer may further edit
though.

The attached patch hence changes debian/changelog and introduces a patch
from upstream [1]. I did not use the patch Squeeze used to ship for some
time, as it is not in use anymore in the current testing package (only
on older, already archived packages). Besides that it patches the issue
straightforward.


[1] http://redmine.lighttpd.net/attachments/1095/08-ssl-retval-fix.patch

- -- 
with kind regards,
Arno Töll
GnuPG Key-ID: 0x8408D4C4
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=BcE0
-----END PGP SIGNATURE-----
diff -ruN lighttpd-1.4.19/debian/changelog lighttpd-1.4.19-patched/debian/changelog
--- lighttpd-1.4.19/debian/changelog	2011-01-07 18:32:18.000000000 +0100
+++ lighttpd-1.4.19-patched/debian/changelog	2011-01-07 18:28:02.000000000 +0100
@@ -1,3 +1,11 @@
+lighttpd (1.4.19-5+lenny2) stable; urgency=low
+
+  [ Arno Toell ]
+  * Fix bug: Recent openssl upgrade breaks lighttpd 
+    (won't start) (Closes: #609124)
+
+ -- XXXXXX <[email protected]>  Fri, 07 Jan 2011 17:57:59 +0100
+
 lighttpd (1.4.19-5+lenny1) stable-security; urgency=high
 
   * Non-maintainer upload by the Security Team.
diff -ruN lighttpd-1.4.19/debian/patches/series lighttpd-1.4.19-patched/debian/patches/series
--- lighttpd-1.4.19/debian/patches/series	2011-01-07 18:32:18.000000000 +0100
+++ lighttpd-1.4.19-patched/debian/patches/series	2011-01-07 18:28:02.000000000 +0100
@@ -6,3 +6,4 @@
 lighttpd-1.4.x_request_header_memleak.patch -p0
 lighttpd-1.4.x_userdir_lowercase.patch -p0
 lighttpd-1.4.x_rewrite_redirect_decode_url.patch -p0
+ssl-retval-fix.patch
diff -ruN lighttpd-1.4.19/debian/patches/ssl-retval-fix.patch lighttpd-1.4.19-patched/debian/patches/ssl-retval-fix.patch
--- lighttpd-1.4.19/debian/patches/ssl-retval-fix.patch	1970-01-01 01:00:00.000000000 +0100
+++ lighttpd-1.4.19-patched/debian/patches/ssl-retval-fix.patch	2011-01-07 18:28:02.000000000 +0100
@@ -0,0 +1,21 @@
+From: Arno Toell <[email protected]>
+Subject: Allow multiple bits in option mask
+
+* src/network.c Fix bits
+
+Origin: upstream, http://redmine.lighttpd.net/attachments/1095/08-ssl-retval-fix.patch
+Bug: http://redmine.lighttpd.net/issues/2157
+Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609124
+
+
+--- a/src/network.c
++++ b/src/network.c
+@@ -332,7 +332,7 @@
+ 
+ 		if (!s->ssl_use_sslv2) {
+ 			/* disable SSLv2 */
+-			if (SSL_OP_NO_SSLv2 != SSL_CTX_set_options(s->ssl_ctx, SSL_OP_NO_SSLv2)) {
++			if (!(SSL_OP_NO_SSLv2 & SSL_CTX_set_options(s->ssl_ctx, SSL_OP_NO_SSLv2))) {
+ 				log_error_write(srv, __FILE__, __LINE__, "ss", "SSL:",
+ 						ERR_error_string(ERR_get_error(), NULL));
+ 				return -1;

Reply via email to