Previous patch was incorrect, it includes a wrong null char test !!!
I'm attaching a correct version.
Thank you!
On Mon, Feb 10, 2014 at 6:24 PM, The default queue via RT
<[email protected]>wrote:
>
> Greetings,
>
> This message has been automatically generated in response to the
> creation of a trouble ticket regarding:
> "ID1729",
> a summary of which appears below.
>
> There is no need to reply to this message right now. Your ticket has been
> assigned an ID of [openssl.org #3261].
>
> Please include the string:
>
> [openssl.org #3261]
>
> in the subject line of all future correspondence about this issue. To do
> so,
> you may reply to this message.
>
> Thank you,
> [email protected]
>
> -------------------------------------------------------------------------
> This bug is still present in lastest release.
>
> Type: bug
> Version: openssl-1.0.1f
> Operating system: linux x86_64 ( +all )
>
>
>
> --
> --
> mdone
>
>
--
--
mdone
--- openssl-1.0.1f-a/crypto/x509/by_dir.c 2014-01-06 15:47:42.000000000 +0200
+++ openssl-1.0.1f-b/crypto/x509/by_dir.c 2014-02-10 16:22:02.890588523 +0200
@@ -226,7 +226,11 @@
ss=s;
s=p+1;
len=(int)(p-ss);
- if (len == 0) continue;
+ if (len == 0) {
+ if ( *p == 0 )
+ break;
+ continue;
+ }
for (j=0; j < sk_BY_DIR_ENTRY_num(ctx->dirs); j++)
{
ent = sk_BY_DIR_ENTRY_value(ctx->dirs, j);
@@ -234,8 +238,11 @@
strncmp(ent->dir,ss,(unsigned int)len) == 0)
break;
}
- if (j < sk_BY_DIR_ENTRY_num(ctx->dirs))
+ if (j < sk_BY_DIR_ENTRY_num(ctx->dirs)) {
+ if ( *p == 0 )
+ break;
continue;
+ }
if (ctx->dirs == NULL)
{
ctx->dirs = sk_BY_DIR_ENTRY_new_null();