From 3cc6cdea0f673eadc61b97756a2ff46281749b5e Mon Sep 17 00:00:00 2001 From: =?utf8?q?Bodo=20M=C3=B6ller?= Date: Tue, 11 Jan 2000 08:09:27 +0000 Subject: [PATCH 1/1] The buffer in ss3_read_n cannot actually occur because it is never called with max > n when extend is set. --- CHANGES | 4 +--- ssl/s3_pkt.c | 2 +- 2 files changed, 2 insertions(+), 4 deletions(-) diff --git a/CHANGES b/CHANGES index c1edb5c2e3..f3073b3ad8 100644 --- a/CHANGES +++ b/CHANGES @@ -4,9 +4,7 @@ Changes between 0.9.4 and 0.9.5 [xx XXX 1999] - *) Rewrite ssl3_read_n (ssl/s3_pkt.c) avoiding a couple of bugs, - including a possible buffer overflow when the 'read_ahead' - flag is set. + *) Rewrite ssl3_read_n (ssl/s3_pkt.c) avoiding a couple of bugs. [Bodo Moeller] *) New function X509_CTX_rget_chain(), this returns the chain diff --git a/ssl/s3_pkt.c b/ssl/s3_pkt.c index 38063b50d5..7728284bef 100644 --- a/ssl/s3_pkt.c +++ b/ssl/s3_pkt.c @@ -293,7 +293,7 @@ again: goto f_err; } - s->rstate=SSL_ST_READ_BODY; + /* now s->rstate == SSL_ST_READ_BODY; */ } /* get and decode the data */ -- 2.34.1