Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 306750 Details for
Bug 448492
CVE-2008-0891 openssl: Server Name extension crash
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
[patch]
Upstream patch
CVE-2008-0891.patch (text/plain), 1.21 KB, created by
Tomas Hoger
on 2008-05-27 09:30:15 UTC
(
hide
)
Description:
Upstream patch
Filename:
MIME Type:
Creator:
Tomas Hoger
Created:
2008-05-27 09:30:15 UTC
Size:
1.21 KB
patch
obsolete
>Index: CHANGES >=================================================================== >RCS file: /e/openssl/cvs/openssl/CHANGES,v >retrieving revision 1.1238.2.86 >diff -u -r1.1238.2.86 CHANGES >--- CHANGES 28 Feb 2008 13:35:58 -0000 1.1238.2.86 >+++ CHANGES 18 Mar 2008 12:06:57 -0000 >@@ -4,6 +4,9 @@ > > Changes between 0.9.8g and 0.9.8h [xx XXX xxxx] > >+ *) Fix double free in TLS server name extensions which could lead to a remote >+ crash found by Codenomicon TLS test suite (CVE-2008-0891) [Joe Orton] >+ > *) Fix BN flag handling in RSA_eay_mod_exp() and BN_MONT_CTX_set() > to get the expected BN_FLG_CONSTTIME behavior. > [Bodo Moeller (Google)] >Index: ssl/t1_lib.c >=================================================================== >RCS file: /e/openssl/cvs/openssl/ssl/t1_lib.c,v >retrieving revision 1.13.2.8 >diff -u -r1.13.2.8 t1_lib.c >--- ssl/t1_lib.c 18 Oct 2007 11:39:11 -0000 1.13.2.8 >+++ ssl/t1_lib.c 18 Mar 2008 12:06:58 -0000 >@@ -381,6 +381,7 @@ > s->session->tlsext_hostname[len]='\0'; > if (strlen(s->session->tlsext_hostname) != len) { > OPENSSL_free(s->session->tlsext_hostname); >+ s->session->tlsext_hostname = NULL; > *al = TLS1_AD_UNRECOGNIZED_NAME; > return 0; > }
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 448492
: 306750