Search
j0ke.net Open Build Service
>
Projects
>
home:netmax
:
monitoring
>
openssl1
> openssl1-CVE-2014-3567.patch
Sign Up
|
Log In
Username
Password
Cancel
Overview
Repositories
Revisions
Requests
Users
Advanced
Attributes
Meta
File openssl1-CVE-2014-3567.patch of Package openssl1
commit 7fd4ce6a997be5f5c9e744ac527725c2850de203 Author: Dr. Stephen Henson <steve@openssl.org> Date: Wed Oct 15 01:53:55 2014 +0100 Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 5dc6070a03779cd524f0e67f76c945cb0ac38320) Index: openssl-1.0.1g/ssl/t1_lib.c =================================================================== --- openssl-1.0.1g.orig/ssl/t1_lib.c 2014-10-21 16:29:34.726126899 +0200 +++ openssl-1.0.1g/ssl/t1_lib.c 2014-10-21 16:29:51.008331906 +0200 @@ -2349,7 +2349,10 @@ static int tls_decrypt_ticket(SSL *s, co HMAC_Final(&hctx, tick_hmac, NULL); HMAC_CTX_cleanup(&hctx); if (CRYPTO_memcmp(tick_hmac, etick + eticklen, mlen)) + { + EVP_CIPHER_CTX_cleanup(&ctx); return 2; + } /* Attempt to decrypt session data */ /* Move p after IV to start of encrypted ticket, update length */ p = etick + 16 + EVP_CIPHER_CTX_iv_length(&ctx);