~ubuntu-branches/ubuntu/lucid/openssl/lucid-security

« back to all changes in this revision

Viewing changes to debian/patches/CVE-2011-4576.patch

  • Committer: Package Import Robot
  • Author(s): Steve Beattie
  • Date: 2012-01-31 01:41:34 UTC
  • Revision ID: package-import@ubuntu.com-20120131014134-dwhpdmijbl7n8mck
Tags: 0.9.8k-7ubuntu8.8
* SECURITY UPDATE: ECDSA private key timing attack
  - debian/patches/CVE-2011-1945.patch: compute with fixed scalar
    length
  - CVE-2011-1945
* SECURITY UPDATE: ECDH ciphersuite denial of service
  - debian/patches/CVE-2011-3210.patch: fix memory usage for thread
    safety
  - CVE-2011-3210
* SECURITY UPDATE: DTLS plaintext recovery attack
  - debian/patches/CVE-2011-4108.patch: perform all computations
    before discarding messages
  - CVE-2011-4108
* SECURITY UPDATE: policy check double free vulnerability
  - debian/patches/CVE-2011-4019.patch: only free domain policyin
    one location
  - CVE-2011-4019
* SECURITY UPDATE: SSL 3.0 block padding exposure
  - debian/patches/CVE-2011-4576.patch: clear bytes used for block
    padding of SSL 3.0 records.
  - CVE-2011-4576
* SECURITY UPDATE: malformed RFC 3779 data denial of service attack
  - debian/patches/CVE-2011-4577.patch: prevent malformed RFC3779
    data from triggering an assertion failure
  - CVE-2011-4577
* SECURITY UPDATE: Server Gated Cryptography (SGC) denial of service
  - debian/patches/CVE-2011-4619.patch: Only allow one SGC handshake
    restart for SSL/TLS.
  - CVE-2011-4619
* SECURITY UPDATE: fix for CVE-2011-4108 denial of service attack
  - debian/patches/CVE-2012-0050.patch: improve handling of DTLS MAC
  - CVE-2012-0050
* debian/patches/openssl-fix_ECDSA_tests.patch: fix ECDSA tests
* debian/libssl0.9.8.postinst: Only issue the reboot notification for
  servers by testing that the X server is not running (LP: #244250)

Show diffs side-by-side

added added

removed removed

Lines of Context:
 
1
Origin: http://cvs.openssl.org/chngview?cn=21940
 
2
Subject: Clear bytes used for block padding of SSL 3.0 records.
 
3
 
 
4
CVE-2011-4576
 
5
 
 
6
[Ubuntu note: modification to CHANGES file has been dropped to reduce
 
7
 patch conflicts.]
 
8
 
 
9
---
 
10
 ssl/s3_enc.c |    3 +++
 
11
 1 file changed, 3 insertions(+)
 
12
 
 
13
Index: b/ssl/s3_enc.c
 
14
===================================================================
 
15
--- a/ssl/s3_enc.c
 
16
+++ b/ssl/s3_enc.c
 
17
@@ -480,6 +480,9 @@ int ssl3_enc(SSL *s, int send)
 
18
 
 
19
                        /* we need to add 'i-1' padding bytes */
 
20
                        l+=i;
 
21
+                       /* the last of these zero bytes will be overwritten
 
22
+                        * with the padding length. */
 
23
+                       memset(&rec->input[rec->length], 0, i);
 
24
                        rec->length+=i;
 
25
                        rec->input[l-1]=(i-1);
 
26
                        }