Author: ken
Date: 2010-11-17 13:03:48 -0700 (Wed, 17 Nov 2010)
New Revision: 2246

Added:
   trunk/openssl/openssl-1.0.0b-fix_manpages-1.patch
   trunk/openssl/openssl-1.0.0b-fix_testsuite-1.patch
Log:
Patches for openssl-1.0.0b

Added: trunk/openssl/openssl-1.0.0b-fix_manpages-1.patch
===================================================================
--- trunk/openssl/openssl-1.0.0b-fix_manpages-1.patch                           
(rev 0)
+++ trunk/openssl/openssl-1.0.0b-fix_manpages-1.patch   2010-11-17 20:03:48 UTC 
(rev 2246)
@@ -0,0 +1 @@
+link openssl-1.0.0a-fix_manpages-1.patch
\ No newline at end of file


Property changes on: trunk/openssl/openssl-1.0.0b-fix_manpages-1.patch
___________________________________________________________________
Added: svn:special
   + *

Added: trunk/openssl/openssl-1.0.0b-fix_testsuite-1.patch
===================================================================
--- trunk/openssl/openssl-1.0.0b-fix_testsuite-1.patch                          
(rev 0)
+++ trunk/openssl/openssl-1.0.0b-fix_testsuite-1.patch  2010-11-17 20:03:48 UTC 
(rev 2246)
@@ -0,0 +1,23 @@
+Submitted By: Ken Moffat <ken at linuxfromscratch dot org>
+Date: 2010-11-17
+Initial Package Version: 1.0.0b
+Upstream Status: From upstream
+Origin: Upstream
+Description: The fix for CVE-2010-3864 broke the testsuite.
+
+Index: openssl/ssl/t1_lib.c
+RCS File: /v/openssl/cvs/openssl/ssl/t1_lib.c,v
+rcsdiff -q -kk '-r1.64.2.15' '-r1.64.2.16' -u 
'/v/openssl/cvs/openssl/ssl/t1_lib.c,v' 2>/dev/null
+--- t1_lib.c   2010/11/16 13:26:24     1.64.2.15
++++ t1_lib.c   2010/11/16 22:41:07     1.64.2.16
+@@ -779,8 +779,8 @@
+                               {
+                               if(s->session->tlsext_ecpointformatlist)
+                                       {
+-                                      *al = TLS1_AD_DECODE_ERROR;
+-                                      return 0;
++                                      
OPENSSL_free(s->session->tlsext_ecpointformatlist);
++                                      s->session->tlsext_ecpointformatlist = 
NULL;
+                                       }
+                               s->session->tlsext_ecpointformatlist_length = 0;
+                               if ((s->session->tlsext_ecpointformatlist = 
OPENSSL_malloc(ecpointformatlist_length)) == NULL)

-- 
http://linuxfromscratch.org/mailman/listinfo/patches
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to