forked from rpms/openssl
- fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey() - fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison - fix CVE-2015-0287 - ASN.1 structure reuse decoding memory corruption - fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data - fix CVE-2015-0293 - triggerable assert in SSLv2 server
14 lines
558 B
Diff
14 lines
558 B
Diff
diff -up openssl-1.0.1e/crypto/asn1/a_type.c.bool-cmp openssl-1.0.1e/crypto/asn1/a_type.c
|
|
--- openssl-1.0.1e/crypto/asn1/a_type.c.bool-cmp 2015-03-18 13:02:36.000000000 +0100
|
|
+++ openssl-1.0.1e/crypto/asn1/a_type.c 2015-03-18 14:38:07.111401390 +0100
|
|
@@ -124,6 +124,9 @@ int ASN1_TYPE_cmp(const ASN1_TYPE *a, co
|
|
case V_ASN1_OBJECT:
|
|
result = OBJ_cmp(a->value.object, b->value.object);
|
|
break;
|
|
+ case V_ASN1_BOOLEAN:
|
|
+ result = a->value.boolean - b->value.boolean;
|
|
+ break;
|
|
case V_ASN1_NULL:
|
|
result = 0; /* They do not have content. */
|
|
break;
|