I found a buffer overrun in ssl_callback_SSLVerify_CRL( ) - ssl_engine_kernel.c: char buff[512]; /* should be plenty */ [...] n = BIO_read(bio, buff, sizeof(buff)); buff[n] = '\0'; If there are more than 512 bytes, n=512, thus we write in buff[512]. We should use n = BIO_read(bio, buff, sizeof(buff) - 1); This could lead to a system crash.
Thanks, Mark. Committed to the trunk and proposed for backport. http://svn.apache.org/viewcvs?rev=179781&view=rev Please note that bugs which you think may have security implications should be reported in the first place to security@apache.org address.
Merged for 2.0.55. http://svn.apache.org/viewcvs?rev=189562&view=rev