1 |
vapier 15/03/04 07:34:28 |
2 |
|
3 |
Added: openssl-1.0.2-CVE-2015-0209.patch |
4 |
openssl-1.0.2-CVE-2015-0288.patch |
5 |
Log: |
6 |
Add fix from upstream for CVE-2015-0209 #541502 by Agostino Sarubbo and CVE-2015-0288 #542038 by Kristian Fiskerstrand. |
7 |
|
8 |
(Portage version: 2.2.17/cvs/Linux x86_64, signed Manifest commit with key D2E96200) |
9 |
|
10 |
Revision Changes Path |
11 |
1.1 dev-libs/openssl/files/openssl-1.0.2-CVE-2015-0209.patch |
12 |
|
13 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/dev-libs/openssl/files/openssl-1.0.2-CVE-2015-0209.patch?rev=1.1&view=markup |
14 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/dev-libs/openssl/files/openssl-1.0.2-CVE-2015-0209.patch?rev=1.1&content-type=text/plain |
15 |
|
16 |
Index: openssl-1.0.2-CVE-2015-0209.patch |
17 |
=================================================================== |
18 |
https://bugs.gentoo.org/541502 |
19 |
|
20 |
From 1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a Mon Sep 17 00:00:00 2001 |
21 |
From: Matt Caswell <matt@×××××××.org> |
22 |
Date: Mon, 9 Feb 2015 11:38:41 +0000 |
23 |
Subject: [PATCH] Fix a failure to NULL a pointer freed on error. |
24 |
MIME-Version: 1.0 |
25 |
Content-Type: text/plain; charset=UTF-8 |
26 |
Content-Transfer-Encoding: 8bit |
27 |
|
28 |
Inspired by BoringSSL commit 517073cd4b by Eric Roman <eroman@××××××××.org> |
29 |
|
30 |
CVE-2015-0209 |
31 |
|
32 |
Reviewed-by: Emilia Käsper <emilia@×××××××.org> |
33 |
--- |
34 |
crypto/ec/ec_asn1.c | 6 +++--- |
35 |
1 file changed, 3 insertions(+), 3 deletions(-) |
36 |
|
37 |
diff --git a/crypto/ec/ec_asn1.c b/crypto/ec/ec_asn1.c |
38 |
index 30b7df4..d3e8316 100644 |
39 |
--- a/crypto/ec/ec_asn1.c |
40 |
+++ b/crypto/ec/ec_asn1.c |
41 |
@@ -1014,8 +1014,6 @@ EC_KEY *d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len) |
42 |
ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE); |
43 |
goto err; |
44 |
} |
45 |
- if (a) |
46 |
- *a = ret; |
47 |
} else |
48 |
ret = *a; |
49 |
|
50 |
@@ -1067,10 +1065,12 @@ EC_KEY *d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len) |
51 |
} |
52 |
} |
53 |
|
54 |
+ if (a) |
55 |
+ *a = ret; |
56 |
ok = 1; |
57 |
err: |
58 |
if (!ok) { |
59 |
- if (ret) |
60 |
+ if (ret && (a == NULL || *a != ret)) |
61 |
EC_KEY_free(ret); |
62 |
ret = NULL; |
63 |
} |
64 |
-- |
65 |
2.3.1 |
66 |
|
67 |
|
68 |
|
69 |
|
70 |
1.1 dev-libs/openssl/files/openssl-1.0.2-CVE-2015-0288.patch |
71 |
|
72 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/dev-libs/openssl/files/openssl-1.0.2-CVE-2015-0288.patch?rev=1.1&view=markup |
73 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/dev-libs/openssl/files/openssl-1.0.2-CVE-2015-0288.patch?rev=1.1&content-type=text/plain |
74 |
|
75 |
Index: openssl-1.0.2-CVE-2015-0288.patch |
76 |
=================================================================== |
77 |
https://bugs.gentoo.org/542038 |
78 |
|
79 |
From 28a00bcd8e318da18031b2ac8778c64147cd54f9 Mon Sep 17 00:00:00 2001 |
80 |
From: "Dr. Stephen Henson" <steve@×××××××.org> |
81 |
Date: Wed, 18 Feb 2015 00:34:59 +0000 |
82 |
Subject: [PATCH] Check public key is not NULL. |
83 |
|
84 |
CVE-2015-0288 |
85 |
PR#3708 |
86 |
|
87 |
Reviewed-by: Matt Caswell <matt@×××××××.org> |
88 |
--- |
89 |
crypto/x509/x509_req.c | 2 ++ |
90 |
1 file changed, 2 insertions(+) |
91 |
|
92 |
diff --git a/crypto/x509/x509_req.c b/crypto/x509/x509_req.c |
93 |
index bc6e566..01795f4 100644 |
94 |
--- a/crypto/x509/x509_req.c |
95 |
+++ b/crypto/x509/x509_req.c |
96 |
@@ -92,6 +92,8 @@ X509_REQ *X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) |
97 |
goto err; |
98 |
|
99 |
pktmp = X509_get_pubkey(x); |
100 |
+ if (pktmp == NULL) |
101 |
+ goto err; |
102 |
i = X509_REQ_set_pubkey(ret, pktmp); |
103 |
EVP_PKEY_free(pktmp); |
104 |
if (!i) |
105 |
-- |
106 |
2.3.1 |