diff options
author | Anthony G. Basile <blueness@gentoo.org> | 2016-01-28 19:35:37 -0500 |
---|---|---|
committer | Anthony G. Basile <blueness@gentoo.org> | 2016-01-28 19:35:37 -0500 |
commit | 6ace4b68ea5f97705f61941873f504cc3f9ac652 (patch) | |
tree | 0fbbfdf30ebb973a62704c2b2887d4828d328222 /dev-libs/libressl/files | |
parent | dev-libs/libressl: version bump to 2.3.2 (diff) | |
download | gentoo-6ace4b68ea5f97705f61941873f504cc3f9ac652.tar.gz gentoo-6ace4b68ea5f97705f61941873f504cc3f9ac652.tar.bz2 gentoo-6ace4b68ea5f97705f61941873f504cc3f9ac652.zip |
dev-libs/libressl: remove older unstable versions
Package-Manager: portage-2.2.26
Diffstat (limited to 'dev-libs/libressl/files')
-rw-r--r-- | dev-libs/libressl/files/libressl-2.2.4-clientcert.patch | 35 |
1 files changed, 0 insertions, 35 deletions
diff --git a/dev-libs/libressl/files/libressl-2.2.4-clientcert.patch b/dev-libs/libressl/files/libressl-2.2.4-clientcert.patch deleted file mode 100644 index ac2f88e2b901..000000000000 --- a/dev-libs/libressl/files/libressl-2.2.4-clientcert.patch +++ /dev/null @@ -1,35 +0,0 @@ -untrusted comment: signature from openbsd 5.8 base secret key -RWQNNZXtC/MqP8u13/pPZfTpPeHhU93PG0DBihXvQ7lB0CvONLwoTfHr9f40s515bidPGcGLAH4xu+yz3skT6b3tKETEWZw8BgA= - -OpenBSD 5.8 errata 9, Dec 3, 2015: - -CVE-2015-3194 - NULL pointer dereference in client certificate validation - -Apply by doing: - signify -Vep /etc/signify/openbsd-58-base.pub -x 009_clientcert.patch.sig \ - -m - | (cd /usr/src && patch -p0) - -And then rebuild and install libcrypto: - cd /usr/src/lib/libcrypto - make obj - make depend - make - make install - -Index: lib/libssl/src/crypto/rsa/rsa_ameth.c -=================================================================== -RCS file: /cvs/src/lib/libssl/src/crypto/rsa/rsa_ameth.c,v -retrieving revision 1.14 -retrieving revision 1.14.6.1 -diff -u -p -u -p -r1.14 -r1.14.6.1 ---- lib/libssl/src/crypto/rsa/rsa_ameth.c 11 Feb 2015 04:05:14 -0000 1.14 -+++ lib/libssl/src/crypto/rsa/rsa_ameth.c 4 Dec 2015 04:13:43 -0000 1.14.6.1 -@@ -298,7 +298,7 @@ rsa_pss_decode(const X509_ALGOR *alg, X5 - if (pss->maskGenAlgorithm) { - ASN1_TYPE *param = pss->maskGenAlgorithm->parameter; - if (OBJ_obj2nid(pss->maskGenAlgorithm->algorithm) == NID_mgf1 && -- param->type == V_ASN1_SEQUENCE) { -+ param && param->type == V_ASN1_SEQUENCE) { - p = param->value.sequence->data; - plen = param->value.sequence->length; - *pmaskHash = d2i_X509_ALGOR(NULL, &p, plen); |