[Pkg-openssl-changes] r587 - in openssl/branches/squeeze/debian: . patches

Kurt Roeckx kroeckx at alioth.debian.org
Mon Feb 11 19:06:36 UTC 2013


Author: kroeckx
Date: 2013-02-11 19:06:36 +0000 (Mon, 11 Feb 2013)
New Revision: 587

Added:
   openssl/branches/squeeze/debian/patches/CVE-2012-2131.patch
   openssl/branches/squeeze/debian/patches/CVE-2012-2333.patch
Modified:
   openssl/branches/squeeze/debian/changelog
   openssl/branches/squeeze/debian/patches/series
Log:
Old security uploads by security team.


Modified: openssl/branches/squeeze/debian/changelog
===================================================================
--- openssl/branches/squeeze/debian/changelog	2013-02-11 18:45:29 UTC (rev 586)
+++ openssl/branches/squeeze/debian/changelog	2013-02-11 19:06:36 UTC (rev 587)
@@ -1,3 +1,17 @@
+openssl (0.9.8o-4squeeze13) squeeze-security; urgency=high
+
+  * Non-maintainer upload by the Security Team.
+  * Fix CVE-2012-2333: DoS via explicit IV in DTLS
+
+ -- Raphael Geissert <geissert at debian.org>  Wed, 16 May 2012 16:39:28 -0500
+
+openssl (0.9.8o-4squeeze12) squeeze-security; urgency=high
+
+  * Non-maintainer upload by the Security Team.
+  * Fix CVE-2012-2131: incomplete fix of CVE-2012-2110
+
+ -- Raphael Geissert <geissert at debian.org>  Tue, 24 Apr 2012 16:41:03 -0500
+
 openssl (0.9.8o-4squeeze11) squeeze-security; urgency=low
 
   * Really apply CVE-2012-2110

Added: openssl/branches/squeeze/debian/patches/CVE-2012-2131.patch
===================================================================
--- openssl/branches/squeeze/debian/patches/CVE-2012-2131.patch	                        (rev 0)
+++ openssl/branches/squeeze/debian/patches/CVE-2012-2131.patch	2013-02-11 19:06:36 UTC (rev 587)
@@ -0,0 +1,28 @@
+Index: openssl-0.9.8o/crypto/buffer/buffer.c
+===================================================================
+--- openssl-0.9.8o.orig/crypto/buffer/buffer.c
++++ openssl-0.9.8o/crypto/buffer/buffer.c
+@@ -99,6 +99,11 @@ int BUF_MEM_grow(BUF_MEM *str, int len)
+ 	char *ret;
+ 	unsigned int n;
+ 
++	if (len < 0)
++		{
++		BUFerr(BUF_F_BUF_MEM_GROW,ERR_R_MALLOC_FAILURE);
++		return 0;
++		}
+ 	if (str->length >= len)
+ 		{
+ 		str->length=len;
+@@ -141,6 +146,11 @@ int BUF_MEM_grow_clean(BUF_MEM *str, int
+ 	char *ret;
+ 	unsigned int n;
+ 
++	if (len < 0)
++		{
++		BUFerr(BUF_F_BUF_MEM_GROW_CLEAN,ERR_R_MALLOC_FAILURE);
++		return 0;
++		}
+ 	if (str->length >= len)
+ 		{
+ 		memset(&str->data[len],0,str->length-len);

Added: openssl/branches/squeeze/debian/patches/CVE-2012-2333.patch
===================================================================
--- openssl/branches/squeeze/debian/patches/CVE-2012-2333.patch	                        (rev 0)
+++ openssl/branches/squeeze/debian/patches/CVE-2012-2333.patch	2013-02-11 19:06:36 UTC (rev 587)
@@ -0,0 +1,13 @@
+Index: openssl-0.9.8o/ssl/d1_enc.c
+===================================================================
+--- openssl-0.9.8o.orig/ssl/d1_enc.c
++++ openssl-0.9.8o/ssl/d1_enc.c
+@@ -257,7 +257,7 @@ int dtls1_enc(SSL *s, int send)
+ 				}
+ 			/* TLS 1.0 does not bound the number of padding bytes by the block size.
+ 			 * All of them must have value 'padding_length'. */
+-			if (i > (int)rec->length)
++			if (i + bs > (int)rec->length)
+ 				{
+ 				/* Incorrect padding. SSLerr() and ssl3_alert are done
+ 				 * by caller: we don't want to reveal whether this is

Modified: openssl/branches/squeeze/debian/patches/series
===================================================================
--- openssl/branches/squeeze/debian/patches/series	2013-02-11 18:45:29 UTC (rev 586)
+++ openssl/branches/squeeze/debian/patches/series	2013-02-11 19:06:36 UTC (rev 587)
@@ -36,3 +36,5 @@
 CVE-2012-0884.patch
 CVE-2012-1165.patch
 CVE-2012-2110.patch
+CVE-2012-2131.patch
+CVE-2012-2333.patch




More information about the Pkg-openssl-changes mailing list