[Bug 896] Improper Input buffer handling

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Mon Mar 14 23:34:20 EST 2005


http://bugzilla.mindrot.org/show_bug.cgi?id=896


dtucker at zip.com.au changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|ASSIGNED                    |RESOLVED
         Resolution|                            |FIXED




------- Additional Comments From dtucker at zip.com.au  2005-03-14 23:34 -------
This has now been fixed in OpenBSD, Portable HEAD and the 4.0 branch, although
not in the same way as the patches here; it will allow approximately 10MB of
buffer usage before halting the read()s, and the buffer code is now a bit more
aggressive about compacting consumed buffers.  It tests OK with a pathological
hacked client (ie one that sets a window size of 2^32-1).

Thanks for the report.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.




More information about the openssh-bugs mailing list