RE: [openssl.org #3320] Invalid large memory access in openssl due to a bug on the client side

2014-05-12 Thread Ajit Menon via RT
I think this is the right change. However, I see that there is another "len-tot" in the following conditional block #if !defined(OPENSSL_NO_MULTIBLOCK) && EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK This is within the same function. I wonder whether that line is also prone to the same issue and need the sa

[openssl.org #3320] Invalid large memory access in openssl due to a bug on the client side

2014-04-21 Thread Ajit Menon via RT
Hi, This happens in the 0.9.8 branch for sure (event in the latest y version). Not sure if it is there in 1.x versions. The problem is with code in s3_pkt.c: the ssl3_write_bytes() function. Within this function, there is a line, n=(len-tot). Here if 'len' is less than 'tot' then the result is a