Subject: Re: PR/29862 CVS commit: src/crypto/dist/openssl/fips/rsa
To: None <lib-bug-people@netbsd.org, gnats-admin@netbsd.org,>
From: List Mail User <track@Plectere.com>
List: netbsd-bugs
Date: 07/30/2005 23:52:05
The following reply was made to PR lib/29862; it has been noted by GNATS.
From: List Mail User <track@Plectere.com>
To: gnats-bugs@NetBSD.org
Cc:
Subject: Re: PR/29862 CVS commit: src/crypto/dist/openssl/fips/rsa
Date: Sat, 30 Jul 2005 16:51:34 -0700 (PDT)
>...
>The following reply was made to PR lib/29862; it has been noted by GNATS.
>
>From: Christos Zoulas <christos@netbsd.org>
>To: gnats-bugs@netbsd.org
>Cc:
>Subject: PR/29862 CVS commit: src/crypto/dist/openssl/fips/rsa
>Date: Sat, 30 Jul 2005 00:38:40 +0000 (UTC)
>
> Module Name: src
> Committed By: christos
> Date: Sat Jul 30 00:38:40 UTC 2005
>
> Modified Files:
> src/crypto/dist/openssl/fips/rsa: fips_rsa_gen.c
>
> Log Message:
> PR/29862: Denis Lagno: sshd segfaults with long keys
> The problem was that the rsa fips validation code did not allocate long
> enough buffers, so it was trashing the stack.
>
>
> To generate a diff of this commit:
> cvs rdiff -r1.1.1.1 -r1.2 src/crypto/dist/openssl/fips/rsa/fips_rsa_gen.c
>
> Please note that diffs are not public domain; they are subject to the
> copyright notices on the relevant files.
>
>
Does this also fix PR bin/30630? It look like it might and
the timeframe of the openssl-0.9.7f is about right to match the appearance
of that bug (though it only became obvious when some fairly stable machines
with *huge* keys were updated to -current).
Paul Shupak