Blame SOURCES/openssl-1.0.1e-cve-2014-0198.patch

ff4ef5
From: Matt Caswell <matt@openssl.org>
ff4ef5
Date: Sun, 11 May 2014 23:38:37 +0000 (+0100)
ff4ef5
Subject: Fixed NULL pointer dereference. See PR#3321
ff4ef5
X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff_plain;h=b107586
ff4ef5
ff4ef5
Fixed NULL pointer dereference. See PR#3321
ff4ef5
---
ff4ef5
ff4ef5
diff --git a/ssl/s3_pkt.c b/ssl/s3_pkt.c
ff4ef5
index 40eb0dd..d961d12 100644
ff4ef5
--- a/ssl/s3_pkt.c
ff4ef5
+++ b/ssl/s3_pkt.c
ff4ef5
@@ -657,9 +657,6 @@ static int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
ff4ef5
 	SSL3_BUFFER *wb=&(s->s3->wbuf);
ff4ef5
 	SSL_SESSION *sess;
ff4ef5
 
ff4ef5
- 	if (wb->buf == NULL)
ff4ef5
-		if (!ssl3_setup_write_buffer(s))
ff4ef5
-			return -1;
ff4ef5
 
ff4ef5
 	/* first check if there is a SSL3_BUFFER still being written
ff4ef5
 	 * out.  This will happen with non blocking IO */
ff4ef5
@@ -675,6 +672,10 @@ static int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
ff4ef5
 		/* if it went, fall through and send more stuff */
ff4ef5
 		}
ff4ef5
 
ff4ef5
+ 	if (wb->buf == NULL)
ff4ef5
+		if (!ssl3_setup_write_buffer(s))
ff4ef5
+			return -1;
ff4ef5
+
ff4ef5
 	if (len == 0 && !create_empty_fragment)
ff4ef5
 		return 0;
ff4ef5