mirror of
https://github.com/openssl/openssl.git
synced 2024-11-25 11:03:37 +08:00
The buffer in ss3_read_n cannot actually occur because it is never
called with max > n when extend is set.
This commit is contained in:
parent
c51ae173a6
commit
3cc6cdea0f
4
CHANGES
4
CHANGES
@ -4,9 +4,7 @@
|
||||
|
||||
Changes between 0.9.4 and 0.9.5 [xx XXX 1999]
|
||||
|
||||
*) Rewrite ssl3_read_n (ssl/s3_pkt.c) avoiding a couple of bugs,
|
||||
including a possible buffer overflow when the 'read_ahead'
|
||||
flag is set.
|
||||
*) Rewrite ssl3_read_n (ssl/s3_pkt.c) avoiding a couple of bugs.
|
||||
[Bodo Moeller]
|
||||
|
||||
*) New function X509_CTX_rget_chain(), this returns the chain
|
||||
|
@ -293,7 +293,7 @@ again:
|
||||
goto f_err;
|
||||
}
|
||||
|
||||
s->rstate=SSL_ST_READ_BODY;
|
||||
/* now s->rstate == SSL_ST_READ_BODY; */
|
||||
}
|
||||
|
||||
/* get and decode the data */
|
||||
|
Loading…
Reference in New Issue
Block a user