[Pkg-openssl-changes] r711 - openssl/branches/wheezy/debian/patches

Kurt Roeckx kroeckx at moszumanska.debian.org
Thu Jan 8 21:03:11 UTC 2015


Author: kroeckx
Date: 2015-01-08 21:03:11 +0000 (Thu, 08 Jan 2015)
New Revision: 711

Modified:
   openssl/branches/wheezy/debian/patches/0112-A-memory-leak-can-occur-in-dtls1_buffer_record-if-ei.patch
Log:
Make the patch apply


Modified: openssl/branches/wheezy/debian/patches/0112-A-memory-leak-can-occur-in-dtls1_buffer_record-if-ei.patch
===================================================================
--- openssl/branches/wheezy/debian/patches/0112-A-memory-leak-can-occur-in-dtls1_buffer_record-if-ei.patch	2015-01-08 20:48:47 UTC (rev 710)
+++ openssl/branches/wheezy/debian/patches/0112-A-memory-leak-can-occur-in-dtls1_buffer_record-if-ei.patch	2015-01-08 21:03:11 UTC (rev 711)
@@ -24,11 +24,11 @@
  ssl/d1_pkt.c | 30 +++++++++++++++++++++---------
  1 file changed, 21 insertions(+), 9 deletions(-)
 
-diff --git a/ssl/d1_pkt.c b/ssl/d1_pkt.c
-index 73ce488..0059fe2 100644
---- a/ssl/d1_pkt.c
-+++ b/ssl/d1_pkt.c
-@@ -212,7 +212,7 @@ dtls1_buffer_record(SSL *s, record_pqueue *queue, unsigned char *priority)
+Index: openssl-1.0.1e/ssl/d1_pkt.c
+===================================================================
+--- openssl-1.0.1e.orig/ssl/d1_pkt.c	2015-01-08 20:50:22.000000000 +0000
++++ openssl-1.0.1e/ssl/d1_pkt.c	2015-01-08 20:53:54.679118046 +0000
+@@ -212,7 +212,7 @@
  	/* Limit the size of the queue to prevent DOS attacks */
  	if (pqueue_size(queue->q) >= 100)
  		return 0;
@@ -37,10 +37,10 @@
  	rdata = OPENSSL_malloc(sizeof(DTLS1_RECORD_DATA));
  	item = pitem_new(priority, rdata);
  	if (rdata == NULL || item == NULL)
-@@ -247,18 +247,22 @@ dtls1_buffer_record(SSL *s, record_pqueue *queue, unsigned char *priority)
- 	if (!ssl3_setup_buffers(s))
+@@ -242,9 +242,11 @@
+ 	/* insert should not fail, since duplicates are dropped */
+ 	if (pqueue_insert(queue->q, item) == NULL)
  		{
- 		SSLerr(SSL_F_DTLS1_BUFFER_RECORD, ERR_R_INTERNAL_ERROR);
 +		if (rdata->rbuf.buf != NULL)
 +			OPENSSL_free(rdata->rbuf.buf);
  		OPENSSL_free(rdata);
@@ -49,8 +49,9 @@
 +		return(-1);
  		}
  
- 	/* insert should not fail, since duplicates are dropped */
- 	if (pqueue_insert(queue->q, item) == NULL)
+ 	s->packet = NULL;
+@@ -255,9 +257,11 @@
+ 	if (!ssl3_setup_buffers(s))
  		{
  		SSLerr(SSL_F_DTLS1_BUFFER_RECORD, ERR_R_INTERNAL_ERROR);
 +		if (rdata->rbuf.buf != NULL)
@@ -60,9 +61,9 @@
 -		return(0);
 +		return(-1);
  		}
- 
+ 	
  	return(1);
-@@ -314,8 +318,9 @@ dtls1_process_buffered_records(SSL *s)
+@@ -313,8 +317,9 @@
              dtls1_get_unprocessed_record(s);
              if ( ! dtls1_process_record(s))
                  return(0);
@@ -74,7 +75,7 @@
              }
          }
  
-@@ -530,7 +535,6 @@ printf("\n");
+@@ -529,7 +534,6 @@
  
  	/* we have pulled in a full packet so zero things */
  	s->packet_length=0;
@@ -82,7 +83,7 @@
  	return(1);
  
  f_err:
-@@ -563,7 +567,8 @@ int dtls1_get_record(SSL *s)
+@@ -562,7 +566,8 @@
  
  	/* The epoch may have changed.  If so, process all the
  	 * pending records.  This is a non-blocking operation. */
@@ -92,7 +93,7 @@
  
  	/* if we're renegotiating, then there may be buffered records */
  	if (dtls1_get_processed_record(s))
-@@ -700,7 +705,9 @@ again:
+@@ -699,7 +704,9 @@
  		{
  		if ((SSL_in_init(s) || s->in_handshake) && !s->d1->listen)
  			{
@@ -103,7 +104,7 @@
  			}
  		rr->length = 0;
  		s->packet_length = 0;
-@@ -713,6 +720,7 @@ again:
+@@ -712,6 +719,7 @@
  		s->packet_length = 0;  /* dump this record */
  		goto again;   /* get another record */
  		}
@@ -111,7 +112,7 @@
  
  	return(1);
  
-@@ -864,7 +872,11 @@ start:
+@@ -857,7 +865,11 @@
  		 * buffer the application data for later processing rather
  		 * than dropping the connection.
  		 */
@@ -124,6 +125,3 @@
  		rr->length = 0;
  		goto start;
  		}
--- 
-2.1.4
-




More information about the Pkg-openssl-changes mailing list