Subject: Re: PR/29862 CVS commit: src/crypto/dist/openssl/fips/rsa
To: None <lib-bug-people@netbsd.org, gnats-admin@netbsd.org,>
From: List Mail User <track@Plectere.com>
List: netbsd-bugs
Date: 07/30/2005 23:52:05
The following reply was made to PR lib/29862; it has been noted by GNATS.

From: List Mail User <track@Plectere.com>
To: gnats-bugs@NetBSD.org
Cc: 
Subject: Re: PR/29862 CVS commit: src/crypto/dist/openssl/fips/rsa
Date: Sat, 30 Jul 2005 16:51:34 -0700 (PDT)

 >...
 >The following reply was made to PR lib/29862; it has been noted by GNATS.
 >
 >From: Christos Zoulas <christos@netbsd.org>
 >To: gnats-bugs@netbsd.org
 >Cc: 
 >Subject: PR/29862 CVS commit: src/crypto/dist/openssl/fips/rsa
 >Date: Sat, 30 Jul 2005 00:38:40 +0000 (UTC)
 >
 > Module Name:	src
 > Committed By:	christos
 > Date:		Sat Jul 30 00:38:40 UTC 2005
 > 
 > Modified Files:
 > 	src/crypto/dist/openssl/fips/rsa: fips_rsa_gen.c
 > 
 > Log Message:
 > PR/29862: Denis Lagno: sshd segfaults with long keys
 > The problem was that the rsa fips validation code did not allocate long
 > enough buffers, so it was trashing the stack.
 > 
 > 
 > To generate a diff of this commit:
 > cvs rdiff -r1.1.1.1 -r1.2 src/crypto/dist/openssl/fips/rsa/fips_rsa_gen.c
 > 
 > Please note that diffs are not public domain; they are subject to the
 > copyright notices on the relevant files.
 > 
 >
 	Does this also fix PR bin/30630?  It look like it might and
 the timeframe of the openssl-0.9.7f is about right to match the appearance
 of that bug (though it only became obvious when some fairly stable machines
 with *huge* keys were updated to -current).
 
 	Paul Shupak