summaryrefslogtreecommitdiffstats
path: root/meta/recipes-support/gnutls/gnutls/CVE-2016-7444.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-support/gnutls/gnutls/CVE-2016-7444.patch')
-rw-r--r--meta/recipes-support/gnutls/gnutls/CVE-2016-7444.patch31
1 files changed, 31 insertions, 0 deletions
diff --git a/meta/recipes-support/gnutls/gnutls/CVE-2016-7444.patch b/meta/recipes-support/gnutls/gnutls/CVE-2016-7444.patch
new file mode 100644
index 0000000000..2bb0626d99
--- /dev/null
+++ b/meta/recipes-support/gnutls/gnutls/CVE-2016-7444.patch
@@ -0,0 +1,31 @@
1From 964632f37dfdfb914ebc5e49db4fa29af35b1de9 Mon Sep 17 00:00:00 2001
2From: Nikos Mavrogiannopoulos <nmav@gnutls.org>
3Date: Sat, 27 Aug 2016 17:00:22 +0200
4Subject: [PATCH] ocsp: corrected the comparison of the serial size in OCSP
5 response
6
7Previously the OCSP certificate check wouldn't verify the serial length
8and could succeed in cases it shouldn't.
9
10Reported by Stefan Buehler.
11
12Upstream-Status: Backport
13CVE: CVE-2016-7444
14Signed-off-by: Armin Kuster <akuster@mvista.com>
15
16---
17 lib/x509/ocsp.c | 1 +
18 1 file changed, 1 insertion(+)
19
20Index: gnutls-3.3.17.1/lib/x509/ocsp.c
21===================================================================
22--- gnutls-3.3.17.1.orig/lib/x509/ocsp.c
23+++ gnutls-3.3.17.1/lib/x509/ocsp.c
24@@ -1257,6 +1257,7 @@ gnutls_ocsp_resp_check_crt(gnutls_ocsp_r
25 gnutls_assert();
26 goto cleanup;
27 }
28+ cserial.size = t;
29
30 if (rserial.size != cserial.size
31 || memcmp(cserial.data, rserial.data, rserial.size) != 0) {