summaryrefslogtreecommitdiffstats
path: root/meta
diff options
context:
space:
mode:
authorPaul Eggleton <paul.eggleton@linux.intel.com>2014-06-09 16:53:44 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2014-06-10 17:12:24 +0100
commitd6f29c015404fb87889e7275a398733a906b81d1 (patch)
treed7a528025d59f066a9b7ef8774e2e2ecf336eba2 /meta
parentc5d81c3386b945293580ed87fcecc0c80851ef0e (diff)
downloadpoky-d6f29c015404fb87889e7275a398733a906b81d1.tar.gz
openssl: use upstream fix for CVE-2014-0198
This replaces the fix for CVE-2014-0198 with one borrowed from Fedora, which is the same as the patch which was actually applied upstream for the issue, i.e.: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=b107586c0c3447ea22dba8698ebbcd81bb29d48c (From OE-Core rev: 21fa437a37dad14145b6c8c8c16c95f1b074e09c) Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r--meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-1.0.1e-cve-2014-0198.patch38
-rw-r--r--meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-CVE-2014-0198-fix.patch23
-rw-r--r--meta/recipes-connectivity/openssl/openssl_1.0.1e.bb2
3 files changed, 39 insertions, 24 deletions
diff --git a/meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-1.0.1e-cve-2014-0198.patch b/meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-1.0.1e-cve-2014-0198.patch
new file mode 100644
index 0000000000..12dcfb7f3a
--- /dev/null
+++ b/meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-1.0.1e-cve-2014-0198.patch
@@ -0,0 +1,38 @@
1From: Matt Caswell <matt@openssl.org>
2Date: Sun, 11 May 2014 23:38:37 +0000 (+0100)
3Subject: Fixed NULL pointer dereference. See PR#3321
4X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff_plain;h=b107586
5
6Fixed NULL pointer dereference. See PR#3321
7
8Patch borrowed from Fedora
9Upstream-Status: Backport
10Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
11
12---
13
14diff --git a/ssl/s3_pkt.c b/ssl/s3_pkt.c
15index 40eb0dd..d961d12 100644
16--- a/ssl/s3_pkt.c
17+++ b/ssl/s3_pkt.c
18@@ -657,9 +657,6 @@ static int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
19 SSL3_BUFFER *wb=&(s->s3->wbuf);
20 SSL_SESSION *sess;
21
22- if (wb->buf == NULL)
23- if (!ssl3_setup_write_buffer(s))
24- return -1;
25
26 /* first check if there is a SSL3_BUFFER still being written
27 * out. This will happen with non blocking IO */
28@@ -675,6 +672,10 @@ static int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
29 /* if it went, fall through and send more stuff */
30 }
31
32+ if (wb->buf == NULL)
33+ if (!ssl3_setup_write_buffer(s))
34+ return -1;
35+
36 if (len == 0 && !create_empty_fragment)
37 return 0;
38
diff --git a/meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-CVE-2014-0198-fix.patch b/meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-CVE-2014-0198-fix.patch
deleted file mode 100644
index 4c51d746ff..0000000000
--- a/meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-CVE-2014-0198-fix.patch
+++ /dev/null
@@ -1,23 +0,0 @@
1Upstream-Status: Backport
2
3Reference: https://bugzilla.redhat.com/show_bug.cgi?id=1093837
4
5CVE-2014-0198: An attacker can trigger generation of an SSL
6alert which could cause a null pointer dereference.
7
8Signed-off-by: Maxin B. John <maxin.john@enea.com>
9---
10diff -Naur openssl-1.0.1g-orig/ssl/s3_pkt.c openssl-1.0.1g/ssl/s3_pkt.c
11--- openssl-1.0.1g-orig/ssl/s3_pkt.c 2014-03-17 17:14:20.000000000 +0100
12+++ openssl-1.0.1g/ssl/s3_pkt.c 2014-05-06 02:32:43.862587660 +0200
13@@ -657,6 +657,10 @@
14 if (i <= 0)
15 return(i);
16 /* if it went, fall through and send more stuff */
17+ /* we may have released our buffer, so get it again */
18+ if (wb->buf == NULL)
19+ if (!ssl3_setup_write_buffer(s))
20+ return -1;
21 }
22
23 if (len == 0 && !create_empty_fragment)
diff --git a/meta/recipes-connectivity/openssl/openssl_1.0.1e.bb b/meta/recipes-connectivity/openssl/openssl_1.0.1e.bb
index 7783206a4b..38cdb3f740 100644
--- a/meta/recipes-connectivity/openssl/openssl_1.0.1e.bb
+++ b/meta/recipes-connectivity/openssl/openssl_1.0.1e.bb
@@ -38,8 +38,8 @@ SRC_URI += "file://configure-targets.patch \
38 file://0001-Fix-DTLS-retransmission-from-previous-session.patch \ 38 file://0001-Fix-DTLS-retransmission-from-previous-session.patch \
39 file://0001-Use-version-in-SSL_METHOD-not-SSL-structure.patch \ 39 file://0001-Use-version-in-SSL_METHOD-not-SSL-structure.patch \
40 file://CVE-2014-0160.patch \ 40 file://CVE-2014-0160.patch \
41 file://openssl-CVE-2014-0198-fix.patch \
42 file://openssl-1.0.1e-cve-2014-0195.patch \ 41 file://openssl-1.0.1e-cve-2014-0195.patch \
42 file://openssl-1.0.1e-cve-2014-0198.patch \
43 " 43 "
44 44
45SRC_URI[md5sum] = "66bf6f10f060d561929de96f9dfe5b8c" 45SRC_URI[md5sum] = "66bf6f10f060d561929de96f9dfe5b8c"