aboutsummaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/openssl/openssl/CVE-2016-0800_3.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-connectivity/openssl/openssl/CVE-2016-0800_3.patch')
-rw-r--r--meta/recipes-connectivity/openssl/openssl/CVE-2016-0800_3.patch503
1 files changed, 0 insertions, 503 deletions
diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2016-0800_3.patch b/meta/recipes-connectivity/openssl/openssl/CVE-2016-0800_3.patch
deleted file mode 100644
index d2602447f3..0000000000
--- a/meta/recipes-connectivity/openssl/openssl/CVE-2016-0800_3.patch
+++ /dev/null
@@ -1,503 +0,0 @@
-From bc38a7d2d3c6082163c50ddf99464736110f2000 Mon Sep 17 00:00:00 2001
-From: Viktor Dukhovni <openssl-users@dukhovni.org>
-Date: Fri, 19 Feb 2016 13:05:11 -0500
-Subject: [PATCH] Disable EXPORT and LOW SSLv3+ ciphers by default
-MIME-Version: 1.0
-Content-Type: text/plain; charset=UTF-8
-Content-Transfer-Encoding: 8bit
-
-Reviewed-by: Emilia Käsper <emilia@openssl.org>
-
-Upstream-Status: Backport
-
-https://git.openssl.org/?p=openssl.git;a=commit;h=bc38a7d2d3c6082163c50ddf99464736110f2000
-
-CVE: CVE-2016-0800 #3 patch
-Signed-off-by: Armin Kuster <akuster@mvista.com>
-
----
- CHANGES | 5 +++++
- Configure | 5 +++++
- NEWS | 1 +
- doc/apps/ciphers.pod | 30 ++++++++++++++++++++---------
- ssl/s3_lib.c | 54 ++++++++++++++++++++++++++++++++++++++++++++++++++++
- 5 files changed, 86 insertions(+), 9 deletions(-)
-
-Index: openssl-1.0.2d/Configure
-===================================================================
---- openssl-1.0.2d.orig/Configure
-+++ openssl-1.0.2d/Configure
-@@ -58,6 +58,10 @@ my $usage="Usage: Configure [no-<cipher>
- # library and will be loaded in run-time by the OpenSSL library.
- # sctp include SCTP support
- # 386 generate 80386 code
-+# enable-weak-ssl-ciphers
-+# Enable EXPORT and LOW SSLv3 ciphers that are disabled by
-+# default. Note, weak SSLv2 ciphers are unconditionally
-+# disabled.
- # no-sse2 disables IA-32 SSE2 code, above option implies no-sse2
- # no-<cipher> build without specified algorithm (rsa, idea, rc5, ...)
- # -<xxx> +<xxx> compiler options are passed through
-@@ -853,6 +857,7 @@ my %disabled = ( # "what" => "co
- "ssl2" => "default",
- "store" => "experimental",
- "unit-test" => "default",
-+ "weak-ssl-ciphers" => "default",
- "zlib" => "default",
- "zlib-dynamic" => "default"
- );
-Index: openssl-1.0.2d/doc/apps/ciphers.pod
-===================================================================
---- openssl-1.0.2d.orig/doc/apps/ciphers.pod
-+++ openssl-1.0.2d/doc/apps/ciphers.pod
-@@ -136,34 +136,46 @@ than 128 bits, and some cipher suites wi
-
- =item B<LOW>
-
--"low" encryption cipher suites, currently those using 64 or 56 bit encryption algorithms
--but excluding export cipher suites.
-+Low strength encryption cipher suites, currently those using 64 or 56 bit
-+encryption algorithms but excluding export cipher suites.
-+As of OpenSSL 1.0.2g, these are disabled in default builds.
-
- =item B<EXP>, B<EXPORT>
-
--export encryption algorithms. Including 40 and 56 bits algorithms.
-+Export strength encryption algorithms. Including 40 and 56 bits algorithms.
-+As of OpenSSL 1.0.2g, these are disabled in default builds.
-
- =item B<EXPORT40>
-
--40 bit export encryption algorithms
-+40-bit export encryption algorithms
-+As of OpenSSL 1.0.2g, these are disabled in default builds.
-
- =item B<EXPORT56>
-
--56 bit export encryption algorithms. In OpenSSL 0.9.8c and later the set of
-+56-bit export encryption algorithms. In OpenSSL 0.9.8c and later the set of
- 56 bit export ciphers is empty unless OpenSSL has been explicitly configured
- with support for experimental ciphers.
-+As of OpenSSL 1.0.2g, these are disabled in default builds.
-
- =item B<eNULL>, B<NULL>
-
--the "NULL" ciphers that is those offering no encryption. Because these offer no
--encryption at all and are a security risk they are disabled unless explicitly
--included.
-+The "NULL" ciphers that is those offering no encryption. Because these offer no
-+encryption at all and are a security risk they are not enabled via either the
-+B<DEFAULT> or B<ALL> cipher strings.
-+Be careful when building cipherlists out of lower-level primitives such as
-+B<kRSA> or B<aECDSA> as these do overlap with the B<eNULL> ciphers.
-+When in doubt, include B<!eNULL> in your cipherlist.
-
- =item B<aNULL>
-
--the cipher suites offering no authentication. This is currently the anonymous
-+The cipher suites offering no authentication. This is currently the anonymous
- DH algorithms and anonymous ECDH algorithms. These cipher suites are vulnerable
- to a "man in the middle" attack and so their use is normally discouraged.
-+These are excluded from the B<DEFAULT> ciphers, but included in the B<ALL>
-+ciphers.
-+Be careful when building cipherlists out of lower-level primitives such as
-+B<kDHE> or B<AES> as these do overlap with the B<aNULL> ciphers.
-+When in doubt, include B<!aNULL> in your cipherlist.
-
- =item B<kRSA>, B<RSA>
-
-Index: openssl-1.0.2d/ssl/s3_lib.c
-===================================================================
---- openssl-1.0.2d.orig/ssl/s3_lib.c
-+++ openssl-1.0.2d/ssl/s3_lib.c
-@@ -198,6 +198,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- },
-
- /* Cipher 03 */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_RSA_RC4_40_MD5,
-@@ -212,6 +213,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 128,
- },
-+#endif
-
- /* Cipher 04 */
- {
-@@ -246,6 +248,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- },
-
- /* Cipher 06 */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_RSA_RC2_40_MD5,
-@@ -260,6 +263,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 128,
- },
-+#endif
-
- /* Cipher 07 */
- #ifndef OPENSSL_NO_IDEA
-@@ -280,6 +284,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- #endif
-
- /* Cipher 08 */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_RSA_DES_40_CBC_SHA,
-@@ -294,8 +299,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 56,
- },
-+#endif
-
- /* Cipher 09 */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_RSA_DES_64_CBC_SHA,
-@@ -310,6 +317,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 56,
- 56,
- },
-+#endif
-
- /* Cipher 0A */
- {
-@@ -329,6 +337,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
-
- /* The DH ciphers */
- /* Cipher 0B */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 0,
- SSL3_TXT_DH_DSS_DES_40_CBC_SHA,
-@@ -343,8 +352,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 56,
- },
-+#endif
-
- /* Cipher 0C */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_DH_DSS_DES_64_CBC_SHA,
-@@ -359,6 +370,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 56,
- 56,
- },
-+#endif
-
- /* Cipher 0D */
- {
-@@ -377,6 +389,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- },
-
- /* Cipher 0E */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 0,
- SSL3_TXT_DH_RSA_DES_40_CBC_SHA,
-@@ -391,8 +404,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 56,
- },
-+#endif
-
- /* Cipher 0F */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_DH_RSA_DES_64_CBC_SHA,
-@@ -407,6 +422,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 56,
- 56,
- },
-+#endif
-
- /* Cipher 10 */
- {
-@@ -426,6 +442,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
-
- /* The Ephemeral DH ciphers */
- /* Cipher 11 */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_EDH_DSS_DES_40_CBC_SHA,
-@@ -440,8 +457,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 56,
- },
-+#endif
-
- /* Cipher 12 */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_EDH_DSS_DES_64_CBC_SHA,
-@@ -456,6 +475,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 56,
- 56,
- },
-+#endif
-
- /* Cipher 13 */
- {
-@@ -474,6 +494,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- },
-
- /* Cipher 14 */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_EDH_RSA_DES_40_CBC_SHA,
-@@ -488,8 +509,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 56,
- },
-+#endif
-
- /* Cipher 15 */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_EDH_RSA_DES_64_CBC_SHA,
-@@ -504,6 +527,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 56,
- 56,
- },
-+#endif
-
- /* Cipher 16 */
- {
-@@ -522,6 +546,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- },
-
- /* Cipher 17 */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_ADH_RC4_40_MD5,
-@@ -536,6 +561,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 128,
- },
-+#endif
-
- /* Cipher 18 */
- {
-@@ -554,6 +580,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- },
-
- /* Cipher 19 */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_ADH_DES_40_CBC_SHA,
-@@ -568,8 +595,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 128,
- },
-+#endif
-
- /* Cipher 1A */
-+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_ADH_DES_64_CBC_SHA,
-@@ -584,6 +613,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 56,
- 56,
- },
-+#endif
-
- /* Cipher 1B */
- {
-@@ -655,6 +685,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- #ifndef OPENSSL_NO_KRB5
- /* The Kerberos ciphers*/
- /* Cipher 1E */
-+# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_KRB5_DES_64_CBC_SHA,
-@@ -669,6 +700,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 56,
- 56,
- },
-+# endif
-
- /* Cipher 1F */
- {
-@@ -719,6 +751,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- },
-
- /* Cipher 22 */
-+# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_KRB5_DES_64_CBC_MD5,
-@@ -733,6 +766,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 56,
- 56,
- },
-+# endif
-
- /* Cipher 23 */
- {
-@@ -783,6 +817,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- },
-
- /* Cipher 26 */
-+# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_KRB5_DES_40_CBC_SHA,
-@@ -797,8 +832,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 56,
- },
-+# endif
-
- /* Cipher 27 */
-+# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_KRB5_RC2_40_CBC_SHA,
-@@ -813,8 +850,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 128,
- },
-+# endif
-
- /* Cipher 28 */
-+# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_KRB5_RC4_40_SHA,
-@@ -829,8 +868,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 128,
- },
-+# endif
-
- /* Cipher 29 */
-+# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_KRB5_DES_40_CBC_MD5,
-@@ -845,8 +886,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 56,
- },
-+# endif
-
- /* Cipher 2A */
-+# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_KRB5_RC2_40_CBC_MD5,
-@@ -861,8 +904,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 128,
- },
-+# endif
-
- /* Cipher 2B */
-+# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- SSL3_TXT_KRB5_RC4_40_MD5,
-@@ -877,6 +922,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 40,
- 128,
- },
-+# endif
- #endif /* OPENSSL_NO_KRB5 */
-
- /* New AES ciphersuites */
-@@ -1300,6 +1346,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- # endif
-
- /* Cipher 62 */
-+# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- TLS1_TXT_RSA_EXPORT1024_WITH_DES_CBC_SHA,
-@@ -1314,8 +1361,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 56,
- 56,
- },
-+# endif
-
- /* Cipher 63 */
-+# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- TLS1_TXT_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA,
-@@ -1330,8 +1379,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 56,
- 56,
- },
-+# endif
-
- /* Cipher 64 */
-+# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- TLS1_TXT_RSA_EXPORT1024_WITH_RC4_56_SHA,
-@@ -1346,8 +1397,10 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 56,
- 128,
- },
-+# endif
-
- /* Cipher 65 */
-+# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
- {
- 1,
- TLS1_TXT_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA,
-@@ -1362,6 +1415,7 @@ OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]
- 56,
- 128,
- },
-+# endif
-
- /* Cipher 66 */
- {
-Index: openssl-1.0.2d/CHANGES
-===================================================================
---- openssl-1.0.2d.orig/CHANGES
-+++ openssl-1.0.2d/CHANGES
-@@ -2,7 +2,11 @@
- OpenSSL CHANGES
- _______________
-
--
-+ * Disable weak ciphers in SSLv3 and up in default builds of OpenSSL.
-+ Builds that are not configured with "enable-weak-ssl-ciphers" will not
-+ provide any "EXPORT" or "LOW" strength ciphers.
-+ [Viktor Dukhovni]
-+
- * Disable SSLv2 default build, default negotiation and weak ciphers. SSLv2
- is by default disabled at build-time. Builds that are not configured with
- "enable-ssl2" will not support SSLv2. Even if "enable-ssl2" is used,
-Index: openssl-1.0.2d/NEWS
-===================================================================
---- openssl-1.0.2d.orig/NEWS
-+++ openssl-1.0.2d/NEWS
-@@ -1,6 +1,7 @@
-
- NEWS
- ====
-+ Disable weak ciphers in SSLv3 and up in default builds of OpenSSL.
- Disable SSLv2 default build, default negotiation and weak ciphers.
-
- This file gives a brief overview of the major changes between each OpenSSL