Additional CVE-2014-0224 protection.
authorDr. Stephen Henson <steve@openssl.org>
Fri, 16 May 2014 11:55:16 +0000 (12:55 +0100)
committerDr. Stephen Henson <steve@openssl.org>
Thu, 5 Jun 2014 12:22:24 +0000 (13:22 +0100)
Return a fatal error if an attempt is made to use a zero length
master secret.
(cherry picked from commit 006cd7083f76ed5cb0d9a914857e9231ef1bc317)

ssl/s3_pkt.c

index 5efc03e5ec64ca886131bd45d73f5fa544a85d92..34eb2b442331f7cdee5d1fa17f3567bcfb380623 100644 (file)
@@ -1727,7 +1727,7 @@ int ssl3_do_change_cipher_spec(SSL *s)
 
        if (s->s3->tmp.key_block == NULL)
                {
-               if (s->session == NULL
+               if (s->session == NULL || s->session->master_key_length == 0)
                        {
                        /* might happen if dtls1_read_bytes() calls this */
                        SSLerr(SSL_F_SSL3_DO_CHANGE_CIPHER_SPEC,SSL_R_CCS_RECEIVED_EARLY);