[prev in list] [next in list] [prev in thread] [next in thread]
List: openssh-bugs
Subject: [Bug 896] Improper Input buffer handling
From: bugzilla-daemon () mindrot ! org
Date: 2005-03-14 12:34:20
Message-ID: 20050314123420.5818E27C19C () shitei ! mindrot ! org
[Download RAW message or body]
http://bugzilla.mindrot.org/show_bug.cgi?id=896
dtucker@zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |RESOLVED
Resolution| |FIXED
------- Additional Comments From dtucker@zip.com.au 2005-03-14 23:34 -------
This has now been fixed in OpenBSD, Portable HEAD and the 4.0 branch, although
not in the same way as the patches here; it will allow approximately 10MB of
buffer usage before halting the read()s, and the buffer code is now a bit more
aggressive about compacting consumed buffers. It tests OK with a pathological
hacked client (ie one that sets a window size of 2^32-1).
Thanks for the report.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
openssh-bugs mailing list
openssh-bugs@mindrot.org
http://www.mindrot.org/mailman/listinfo/openssh-bugs
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic