File openssl-CVE-2014-3568.patch of Package compat-openssl098.11471
commit cd332a07503bd9771595de87e768179f81715704
Author: Geoff Thorpe <geoff@openssl.org>
Date: Wed Oct 15 03:25:50 2014 -0400
Fix no-ssl3 configuration option
CVE-2014-3568
Reviewed-by: Emilia Kasper <emilia@openssl.org>
Reviewed-by: Rich Salz <rsalz@openssl.org>
Index: openssl-0.9.8j/ssl/s23_clnt.c
===================================================================
--- openssl-0.9.8j.orig/ssl/s23_clnt.c 2014-10-15 19:01:28.954526472 +0200
+++ openssl-0.9.8j/ssl/s23_clnt.c 2014-10-21 15:35:11.414859824 +0200
@@ -72,9 +72,11 @@ static SSL_METHOD *ssl23_get_client_meth
if (ver == SSL2_VERSION)
return(SSLv2_client_method());
#endif
+#ifndef OPENSSL_NO_SSL3
if (ver == SSL3_VERSION)
return(SSLv3_client_method());
- else if (ver == TLS1_VERSION)
+#endif
+ if (ver == TLS1_VERSION)
return(TLSv1_client_method());
else
return(NULL);
@@ -541,6 +543,7 @@ static int ssl23_get_server_hello(SSL *s
s->s3->rbuf.left=n;
s->s3->rbuf.offset=0;
+#ifndef OPENSSL_NO_SSL3
if ((p[2] == SSL3_VERSION_MINOR) &&
!(s->options & SSL_OP_NO_SSLv3))
{
@@ -555,7 +558,9 @@ static int ssl23_get_server_hello(SSL *s
s->version=SSL3_VERSION;
s->method=SSLv3_client_method();
}
- else if ((p[2] == TLS1_VERSION_MINOR) &&
+ else
+#endif
+ if ((p[2] == TLS1_VERSION_MINOR) &&
!(s->options & SSL_OP_NO_TLSv1))
{
s->version=TLS1_VERSION;
Index: openssl-0.9.8j/ssl/s23_srvr.c
===================================================================
--- openssl-0.9.8j.orig/ssl/s23_srvr.c 2014-10-15 18:04:45.885719431 +0200
+++ openssl-0.9.8j/ssl/s23_srvr.c 2014-10-21 15:35:11.414859824 +0200
@@ -124,9 +124,11 @@ static SSL_METHOD *ssl23_get_server_meth
if (ver == SSL2_VERSION)
return(SSLv2_server_method());
#endif
+#ifndef OPENSSL_NO_SSL3
if (ver == SSL3_VERSION)
return(SSLv3_server_method());
- else if (ver == TLS1_VERSION)
+#endif
+ if (ver == TLS1_VERSION)
return(TLSv1_server_method());
else
return(NULL);
@@ -534,6 +536,12 @@ int ssl23_get_client_hello(SSL *s)
if ((type == 2) || (type == 3))
{
/* we have SSLv3/TLSv1 (type 2: SSL2 style, type 3: SSL3/TLS style) */
+ s->method = ssl23_get_server_method(s->version);
+ if (s->method == NULL)
+ {
+ SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO,SSL_R_UNSUPPORTED_PROTOCOL);
+ goto err;
+ }
if (!ssl_init_wbio_buffer(s,1)) goto err;
@@ -557,11 +565,6 @@ int ssl23_get_client_hello(SSL *s)
s->s3->rbuf.left=0;
s->s3->rbuf.offset=0;
}
-
- if (s->version == TLS1_VERSION)
- s->method = TLSv1_server_method();
- else
- s->method = SSLv3_server_method();
#if 0 /* ssl3_get_client_hello does this */
s->client_version=(v[0]<<8)|v[1];
#endif