[openssl.org #247] Openssl fix

2002-08-25 Thread via RT
How do I apply the following fix to openssl version 0.9.6d? Invalid ASN1 DSA parameter sequences cause d2i_DSAparams() to free a data pointer twice, leading to the usual boring chaos. Fix is appended below. This same bug appears in the following functions (same fix): d2i_DHparams() d2i_RSAPrivat

[STATUS] OpenSSL (Sun 25-Aug-2002)

2002-08-25 Thread OpenSSL Project
OpenSSL STATUS Last modified at __ $Date: 2002/08/14 11:07:29 $ DEVELOPMENT STATE o OpenSSL 0.9.8: Under development... o OpenSSL 0.9.7-beta3: Released on July 30th, 2002 o OpenSSL 0.9.7-beta2: Released on Jun

Re: Qn on buffer overflow checks in OpenSSL 0.9.6.g

2002-08-25 Thread Ben Laurie
Tushar wrote: > Hi, > > I have a question regarding the buffer overflow checks > in 0.9.6g. > > Why do we always check for > SSL2_MAX_RECORD_LENGTH_3_BYTE_HEADER? > ^^^ > Shouldn't it be for > SSL2_MAX_RECORD_LENGTH_2_BYTE_HEADER > ^^^ > > Line# 4