* [gentoo-commits] gentoo-x86 commit in dev-libs/openssl/files: openssl-0.9.8g-CVE-2008-0891.patch openssl-0.9.8g-CVE-2008-1672.patch
@ 2008-05-30 21:30 Doug Goldstein (cardoe)
0 siblings, 0 replies; only message in thread
From: Doug Goldstein (cardoe) @ 2008-05-30 21:30 UTC (permalink / raw
To: gentoo-commits
cardoe 08/05/30 21:30:30
Added: openssl-0.9.8g-CVE-2008-0891.patch
openssl-0.9.8g-CVE-2008-1672.patch
Log:
Security fix for CVE-2008-0891 & CVE-2008-1672. bug #223429
(Portage version: 2.1.5.2)
Revision Changes Path
1.1 dev-libs/openssl/files/openssl-0.9.8g-CVE-2008-0891.patch
file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/dev-libs/openssl/files/openssl-0.9.8g-CVE-2008-0891.patch?rev=1.1&view=markup
plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/dev-libs/openssl/files/openssl-0.9.8g-CVE-2008-0891.patch?rev=1.1&content-type=text/plain
Index: openssl-0.9.8g-CVE-2008-0891.patch
===================================================================
Index: ssl/t1_lib.c
===================================================================
RCS file: /e/openssl/cvs/openssl/ssl/t1_lib.c,v
retrieving revision 1.13.2.8
diff -u -r1.13.2.8 t1_lib.c
--- ssl/t1_lib.c 18 Oct 2007 11:39:11 -0000 1.13.2.8
+++ ssl/t1_lib.c 18 Mar 2008 12:06:58 -0000
@@ -381,6 +381,7 @@
s->session->tlsext_hostname[len]='\0';
if (strlen(s->session->tlsext_hostname) != len) {
OPENSSL_free(s->session->tlsext_hostname);
+ s->session->tlsext_hostname = NULL;
*al = TLS1_AD_UNRECOGNIZED_NAME;
return 0;
}
1.1 dev-libs/openssl/files/openssl-0.9.8g-CVE-2008-1672.patch
file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/dev-libs/openssl/files/openssl-0.9.8g-CVE-2008-1672.patch?rev=1.1&view=markup
plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/dev-libs/openssl/files/openssl-0.9.8g-CVE-2008-1672.patch?rev=1.1&content-type=text/plain
Index: openssl-0.9.8g-CVE-2008-1672.patch
===================================================================
Index: ssl/s3_clnt.c
===================================================================
RCS file: /e/openssl/cvs/openssl/ssl/s3_clnt.c,v
retrieving revision 1.88.2.12
diff -u -r1.88.2.12 s3_clnt.c
--- ssl/s3_clnt.c 3 Nov 2007 13:07:39 -0000 1.88.2.12
+++ ssl/s3_clnt.c 22 May 2008 09:19:30 -0000
@@ -2061,6 +2061,13 @@
{
DH *dh_srvr,*dh_clnt;
+ if (s->session->sess_cert == NULL)
+ {
+ ssl3_send_alert(s,SSL3_AL_FATAL,SSL_AD_UNEXPECTED_MESSAGE);
+ SSLerr(SSL_F_SSL3_SEND_CLIENT_KEY_EXCHANGE,SSL_R_UNEXPECTED_MESSAGE);
+ goto err;
+ }
+
if (s->session->sess_cert->peer_dh_tmp != NULL)
dh_srvr=s->session->sess_cert->peer_dh_tmp;
else
--
gentoo-commits@lists.gentoo.org mailing list
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2008-05-30 21:30 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-05-30 21:30 [gentoo-commits] gentoo-x86 commit in dev-libs/openssl/files: openssl-0.9.8g-CVE-2008-0891.patch openssl-0.9.8g-CVE-2008-1672.patch Doug Goldstein (cardoe)
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox