[Bug 2566] 2 integer overflows in function ssh_packet_send2_wrapped()

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Tue May 3 23:28:51 AEST 2016


https://bugzilla.mindrot.org/show_bug.cgi?id=2566

Damien Miller <djm at mindrot.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |ASSIGNED
           Assignee|unassigned-bugs at mindrot.org |djm at mindrot.org
                 CC|                            |djm at mindrot.org

--- Comment #1 from Damien Miller <djm at mindrot.org> ---
Created attachment 2813
  --> https://bugzilla.mindrot.org/attachment.cgi?id=2813&action=edit
check padding calculations

Hi,

Thanks for the report. I think we can avoid these by promoting the
padding calculation variables' types from u_char to u_int and dropping
in a few checks. This patch implements this.

It's currently cranking through our regression tests...

-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list