[Bug 3250] Integer overflow in ConnectTimeout
bugzilla-daemon at mindrot.org
bugzilla-daemon at mindrot.org
Mon Jan 11 11:37:20 AEDT 2021
https://bugzilla.mindrot.org/show_bug.cgi?id=3250
Darren Tucker <dtucker at dtucker.net> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #3465|0 |1
is obsolete| |
CC| |djm at mindrot.org
Attachment #3466| |ok?(djm at mindrot.org)
Flags| |
--- Comment #1 from Darren Tucker <dtucker at dtucker.net> ---
Created attachment 3466
--> https://bugzilla.mindrot.org/attachment.cgi?id=3466&action=edit
convtime return long -> int
THere a bit more to it than that. convtime() returns -1 on error
including negative values, but it returns a long. On a platform where
sizeof(int) != sizeof(long), convtime can accept a large positive value
that then wraps to negative. I think the correct thing to do is to
change convtime to return int.
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
More information about the openssh-bugs
mailing list