Bugzilla – Attachment 817 Details for
Bug 896
Improper Input buffer handling
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
Hack client to reproduce problem in sshd.
openssh-buffer-testcase.patch (text/plain), 994 bytes, created by
Darren Tucker
on 2005-02-11 12:05:14 AEDT
(
hide
)
Description:
Hack client to reproduce problem in sshd.
Filename:
MIME Type:
Creator:
Darren Tucker
Created:
2005-02-11 12:05:14 AEDT
Size:
994 bytes
patch
obsolete
>Index: clientloop.c >=================================================================== >RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/clientloop.c,v >retrieving revision 1.118 >diff -u -p -r1.118 clientloop.c >--- clientloop.c 7 Nov 2004 09:06:19 -0000 1.118 >+++ clientloop.c 10 Feb 2005 23:14:21 -0000 >@@ -191,6 +191,7 @@ window_change_handler(int sig) > static void > signal_handler(int sig) > { >+ sleep(60); /* XXX */ > received_signal = sig; > quit_pending = 1; > } >Index: ssh.c >=================================================================== >RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/ssh.c,v >retrieving revision 1.214 >diff -u -p -r1.214 ssh.c >--- ssh.c 3 Dec 2004 03:10:19 -0000 1.214 >+++ ssh.c 10 Feb 2005 22:47:02 -0000 >@@ -1143,7 +1143,7 @@ ssh_session2_open(void) > if (!isatty(err)) > set_nonblock(err); > >- window = CHAN_SES_WINDOW_DEFAULT; >+ window = CHAN_SES_WINDOW_DEFAULT * 100; > packetmax = CHAN_SES_PACKET_DEFAULT; > if (tty_flag) { > window >>= 1;
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 896
:
685
| 817 |
818
|
819