From 04985871ca81e1e70e7b1c669f351cf145109df4 Mon Sep 17 00:00:00 2001 From: Dirk Meyer Date: Wed, 17 Nov 2010 10:35:00 +0000 Subject: - Security update to 1.0.0b Security: http://openssl.org/news/secadv_20101116.txt Security: CVE-2010-3864 PR: 152312 Submitted by: Alexander Wittig - Fix regression in TLS handling Obtained from: http://cvs.openssl.org/chngview?cn=19998 --- security/openssl/files/patch-t1_lib.c | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 security/openssl/files/patch-t1_lib.c (limited to 'security/openssl/files') diff --git a/security/openssl/files/patch-t1_lib.c b/security/openssl/files/patch-t1_lib.c new file mode 100644 index 000000000000..f4fe07588283 --- /dev/null +++ b/security/openssl/files/patch-t1_lib.c @@ -0,0 +1,16 @@ +Index: openssl/ssl/t1_lib.c +RCS File: /v/openssl/cvs/openssl/ssl/t1_lib.c,v +rcsdiff -q -kk '-r1.64.2.15' '-r1.64.2.16' -u '/v/openssl/cvs/openssl/ssl/t1_lib.c,v' 2>/dev/null +--- ssl/t1_lib.c 2010/11/16 13:26:24 1.64.2.15 ++++ ssl/t1_lib.c 2010/11/16 22:41:07 1.64.2.16 +@@ -779,8 +779,8 @@ + { + if(s->session->tlsext_ecpointformatlist) + { +- *al = TLS1_AD_DECODE_ERROR; +- return 0; ++ OPENSSL_free(s->session->tlsext_ecpointformatlist); ++ s->session->tlsext_ecpointformatlist = NULL; + } + s->session->tlsext_ecpointformatlist_length = 0; + if ((s->session->tlsext_ecpointformatlist = OPENSSL_malloc(ecpointformatlist_length)) == NULL) -- cgit v1.2.3