diff options
author | Sona Sarmadi <sona.sarmadi@enea.com> | 2015-03-06 07:26:43 +0100 |
---|---|---|
committer | Tudor Florea <tudor.florea@enea.com> | 2015-07-06 20:19:39 +0200 |
commit | 13e4abbce92f9b7630563a0b7f9d8be6db3919c9 (patch) | |
tree | aee692962e07fd1e47006afe385085d4ef5c7679 /meta/recipes-connectivity/openssl/openssl/0003-CVE-2015-0205.patch | |
parent | 72bec03e72908b002355a3dba39c9b9caec2b473 (diff) | |
download | poky-13e4abbce92f9b7630563a0b7f9d8be6db3919c9.tar.gz |
openssl: multiple CVEs fixes
This patch addresses following CVEs:
CVE-2014-3569
CVE-2015-0204
CVE-2015-0205
CVE-2014-8275
CVE-2014-3571
CVE-2014-3570
Additional two patches (0004 & 0005) which were needed for CVE-2014-8275
have been backported from 1.0.1 stable (OpenSSL_1_0_1-stable) branch.
Reference
https://www.openssl.org/news/secadv_20150108.txt
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Diffstat (limited to 'meta/recipes-connectivity/openssl/openssl/0003-CVE-2015-0205.patch')
-rw-r--r-- | meta/recipes-connectivity/openssl/openssl/0003-CVE-2015-0205.patch | 42 |
1 files changed, 42 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/openssl/openssl/0003-CVE-2015-0205.patch b/meta/recipes-connectivity/openssl/openssl/0003-CVE-2015-0205.patch new file mode 100644 index 0000000000..c4326d8c02 --- /dev/null +++ b/meta/recipes-connectivity/openssl/openssl/0003-CVE-2015-0205.patch | |||
@@ -0,0 +1,42 @@ | |||
1 | From 98a0f9660d374f58f79ee0efcc8c1672a805e8e8 Mon Sep 17 00:00:00 2001 | ||
2 | From: "Dr. Stephen Henson" <steve@openssl.org> | ||
3 | Date: Thu, 23 Oct 2014 20:36:17 +0100 | ||
4 | Subject: [PATCH] Unauthenticated DH client certificate fix. | ||
5 | |||
6 | Fix to prevent use of DH client certificates without sending | ||
7 | certificate verify message. | ||
8 | |||
9 | If we've used a client certificate to generate the premaster secret | ||
10 | ssl3_get_client_key_exchange returns 2 and ssl3_get_cert_verify is | ||
11 | never called. | ||
12 | |||
13 | We can only skip the certificate verify message in | ||
14 | ssl3_get_cert_verify if the client didn't send a certificate. | ||
15 | |||
16 | Thanks to Karthikeyan Bhargavan for reporting this issue. | ||
17 | CVE-2015-0205 | ||
18 | Reviewed-by: Matt Caswell <matt@openssl.org> | ||
19 | |||
20 | Upstream-Status: Backport | ||
21 | |||
22 | Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> | ||
23 | --- | ||
24 | ssl/s3_srvr.c | 2 +- | ||
25 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
26 | |||
27 | diff --git a/ssl/s3_srvr.c b/ssl/s3_srvr.c | ||
28 | index d883f86..fadca74 100644 | ||
29 | --- a/ssl/s3_srvr.c | ||
30 | +++ b/ssl/s3_srvr.c | ||
31 | @@ -3014,7 +3014,7 @@ int ssl3_get_cert_verify(SSL *s) | ||
32 | if (s->s3->tmp.message_type != SSL3_MT_CERTIFICATE_VERIFY) | ||
33 | { | ||
34 | s->s3->tmp.reuse_message=1; | ||
35 | - if ((peer != NULL) && (type & EVP_PKT_SIGN)) | ||
36 | + if (peer != NULL) | ||
37 | { | ||
38 | al=SSL_AD_UNEXPECTED_MESSAGE; | ||
39 | SSLerr(SSL_F_SSL3_GET_CERT_VERIFY,SSL_R_MISSING_VERIFY_MESSAGE); | ||
40 | -- | ||
41 | 1.9.1 | ||
42 | |||