Blame SOURCES/openssl-1.0.1e-cve-2014-0198.patch
|
|
ff4ef5 |
From: Matt Caswell <matt@openssl.org>
|
|
|
ff4ef5 |
Date: Sun, 11 May 2014 23:38:37 +0000 (+0100)
|
|
|
ff4ef5 |
Subject: Fixed NULL pointer dereference. See PR#3321
|
|
|
ff4ef5 |
X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff_plain;h=b107586
|
|
|
ff4ef5 |
|
|
|
ff4ef5 |
Fixed NULL pointer dereference. See PR#3321
|
|
|
ff4ef5 |
---
|
|
|
ff4ef5 |
|
|
|
ff4ef5 |
diff --git a/ssl/s3_pkt.c b/ssl/s3_pkt.c
|
|
|
ff4ef5 |
index 40eb0dd..d961d12 100644
|
|
|
ff4ef5 |
--- a/ssl/s3_pkt.c
|
|
|
ff4ef5 |
+++ b/ssl/s3_pkt.c
|
|
|
ff4ef5 |
@@ -657,9 +657,6 @@ static int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
|
|
|
ff4ef5 |
SSL3_BUFFER *wb=&(s->s3->wbuf);
|
|
|
ff4ef5 |
SSL_SESSION *sess;
|
|
|
ff4ef5 |
|
|
|
ff4ef5 |
- if (wb->buf == NULL)
|
|
|
ff4ef5 |
- if (!ssl3_setup_write_buffer(s))
|
|
|
ff4ef5 |
- return -1;
|
|
|
ff4ef5 |
|
|
|
ff4ef5 |
/* first check if there is a SSL3_BUFFER still being written
|
|
|
ff4ef5 |
* out. This will happen with non blocking IO */
|
|
|
ff4ef5 |
@@ -675,6 +672,10 @@ static int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
|
|
|
ff4ef5 |
/* if it went, fall through and send more stuff */
|
|
|
ff4ef5 |
}
|
|
|
ff4ef5 |
|
|
|
ff4ef5 |
+ if (wb->buf == NULL)
|
|
|
ff4ef5 |
+ if (!ssl3_setup_write_buffer(s))
|
|
|
ff4ef5 |
+ return -1;
|
|
|
ff4ef5 |
+
|
|
|
ff4ef5 |
if (len == 0 && !create_empty_fragment)
|
|
|
ff4ef5 |
return 0;
|
|
|
ff4ef5 |
|