[prev in list] [next in list] [prev in thread] [next in thread] 

List:       openssh-bugs
Subject:    [Bug 896] Improper Input buffer handling
From:       bugzilla-daemon () mindrot ! org
Date:       2005-03-14 12:34:20
Message-ID: 20050314123420.5818E27C19C () shitei ! mindrot ! org
[Download RAW message or body]

http://bugzilla.mindrot.org/show_bug.cgi?id=896


dtucker@zip.com.au changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|ASSIGNED                    |RESOLVED
         Resolution|                            |FIXED




------- Additional Comments From dtucker@zip.com.au  2005-03-14 23:34 -------
This has now been fixed in OpenBSD, Portable HEAD and the 4.0 branch, although
not in the same way as the patches here; it will allow approximately 10MB of
buffer usage before halting the read()s, and the buffer code is now a bit more
aggressive about compacting consumed buffers.  It tests OK with a pathological
hacked client (ie one that sets a window size of 2^32-1).

Thanks for the report.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
openssh-bugs mailing list
openssh-bugs@mindrot.org
http://www.mindrot.org/mailman/listinfo/openssh-bugs
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic