| Summary: | Software vulnerabilities detected using ESBMC-WR tool | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | janislley <janislley> |
| Component: | ssh | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED INVALID | ||
| Severity: | security | CC: | djm, dtucker |
| Priority: | P5 | ||
| Version: | 8.8p1 | ||
| Hardware: | amd64 | ||
| OS: | Linux | ||
|
Description
janislley
2022-01-20 14:38:12 AEDT
I think these are both false positives. (In reply to janislley from comment #0) [...] > State 2 file syserr.c There is no file with that name in OpenSSH. There is (potentially, if depending on autoconf) a strerror, however a) it's in bsd-misc.c and b) Linuxes usually have a native strerror. > line 4 function strerror thread 0 Line 4 in bsd-misc.c is in the middle of a comment block. [...] > State 3 file syserr.c line 108 function strerror thread 0 Line 108 in bsd-misc.c is a blank line after the strerror function. In addition, the strerror replacement explicitly checks for errno<0: const char *strerror(int e) { extern int sys_nerr; extern char *sys_errlist[]; if ((e >= 0) && (e < sys_nerr)) return (sys_errlist[e]); return ("unlisted error"); } Closing for lack of followup. Please reopen after addressing Darren's concerns in comment #1 closing bug resolved during openssh-9.0 release cycle |