Gentoo Archives: gentoo-commits

From: "Mike Frysinger (vapier)" <vapier@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo-x86 commit in dev-libs/openssl/files: openssl-1.0.2-CVE-2015-0209.patch openssl-1.0.2-CVE-2015-0288.patch
Date: Wed, 04 Mar 2015 07:34:35
Message-Id: 20150304073428.308481301D@oystercatcher.gentoo.org
1 vapier 15/03/04 07:34:28
2
3 Added: openssl-1.0.2-CVE-2015-0209.patch
4 openssl-1.0.2-CVE-2015-0288.patch
5 Log:
6 Add fix from upstream for CVE-2015-0209 #541502 by Agostino Sarubbo and CVE-2015-0288 #542038 by Kristian Fiskerstrand.
7
8 (Portage version: 2.2.17/cvs/Linux x86_64, signed Manifest commit with key D2E96200)
9
10 Revision Changes Path
11 1.1 dev-libs/openssl/files/openssl-1.0.2-CVE-2015-0209.patch
12
13 file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/dev-libs/openssl/files/openssl-1.0.2-CVE-2015-0209.patch?rev=1.1&view=markup
14 plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/dev-libs/openssl/files/openssl-1.0.2-CVE-2015-0209.patch?rev=1.1&content-type=text/plain
15
16 Index: openssl-1.0.2-CVE-2015-0209.patch
17 ===================================================================
18 https://bugs.gentoo.org/541502
19
20 From 1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a Mon Sep 17 00:00:00 2001
21 From: Matt Caswell <matt@×××××××.org>
22 Date: Mon, 9 Feb 2015 11:38:41 +0000
23 Subject: [PATCH] Fix a failure to NULL a pointer freed on error.
24 MIME-Version: 1.0
25 Content-Type: text/plain; charset=UTF-8
26 Content-Transfer-Encoding: 8bit
27
28 Inspired by BoringSSL commit 517073cd4b by Eric Roman <eroman@××××××××.org>
29
30 CVE-2015-0209
31
32 Reviewed-by: Emilia Käsper <emilia@×××××××.org>
33 ---
34 crypto/ec/ec_asn1.c | 6 +++---
35 1 file changed, 3 insertions(+), 3 deletions(-)
36
37 diff --git a/crypto/ec/ec_asn1.c b/crypto/ec/ec_asn1.c
38 index 30b7df4..d3e8316 100644
39 --- a/crypto/ec/ec_asn1.c
40 +++ b/crypto/ec/ec_asn1.c
41 @@ -1014,8 +1014,6 @@ EC_KEY *d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len)
42 ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE);
43 goto err;
44 }
45 - if (a)
46 - *a = ret;
47 } else
48 ret = *a;
49
50 @@ -1067,10 +1065,12 @@ EC_KEY *d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len)
51 }
52 }
53
54 + if (a)
55 + *a = ret;
56 ok = 1;
57 err:
58 if (!ok) {
59 - if (ret)
60 + if (ret && (a == NULL || *a != ret))
61 EC_KEY_free(ret);
62 ret = NULL;
63 }
64 --
65 2.3.1
66
67
68
69
70 1.1 dev-libs/openssl/files/openssl-1.0.2-CVE-2015-0288.patch
71
72 file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/dev-libs/openssl/files/openssl-1.0.2-CVE-2015-0288.patch?rev=1.1&view=markup
73 plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/dev-libs/openssl/files/openssl-1.0.2-CVE-2015-0288.patch?rev=1.1&content-type=text/plain
74
75 Index: openssl-1.0.2-CVE-2015-0288.patch
76 ===================================================================
77 https://bugs.gentoo.org/542038
78
79 From 28a00bcd8e318da18031b2ac8778c64147cd54f9 Mon Sep 17 00:00:00 2001
80 From: "Dr. Stephen Henson" <steve@×××××××.org>
81 Date: Wed, 18 Feb 2015 00:34:59 +0000
82 Subject: [PATCH] Check public key is not NULL.
83
84 CVE-2015-0288
85 PR#3708
86
87 Reviewed-by: Matt Caswell <matt@×××××××.org>
88 ---
89 crypto/x509/x509_req.c | 2 ++
90 1 file changed, 2 insertions(+)
91
92 diff --git a/crypto/x509/x509_req.c b/crypto/x509/x509_req.c
93 index bc6e566..01795f4 100644
94 --- a/crypto/x509/x509_req.c
95 +++ b/crypto/x509/x509_req.c
96 @@ -92,6 +92,8 @@ X509_REQ *X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md)
97 goto err;
98
99 pktmp = X509_get_pubkey(x);
100 + if (pktmp == NULL)
101 + goto err;
102 i = X509_REQ_set_pubkey(ret, pktmp);
103 EVP_PKEY_free(pktmp);
104 if (!i)
105 --
106 2.3.1