| Summary: | Potential Software vulnerabilities detected using ESBMC-WR tool | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | janislley <janislley> | ||||
| Component: | ssh | Assignee: | Assigned to nobody <unassigned-bugs> | ||||
| Status: | CLOSED INVALID | ||||||
| Severity: | security | CC: | djm | ||||
| Priority: | P5 | ||||||
| Version: | 8.8p1 | ||||||
| Hardware: | Other | ||||||
| OS: | Linux | ||||||
| Attachments: |
|
||||||
|
Description
janislley
2022-06-26 16:06:15 AEST
Most of these are completely obvious false positives. E.g.
> State 6 file sshkey.c line 1081 function fingerprint_bubblebabble thread 0
> ----------------------------------------------------
> Violated property:
> file sshkey.c line 1081 function fingerprint_bubblebabble
> dereference failure: array bounds violated
The array is allocated to be sufficiently sized literally in the previous line.
Please forgive my bluntness, but low quality reports like this do nothing but waste our time - there is no discernable signal among the noise.
Please do not submit more unless they have been assessed by a human.
Closing bugs from openssh-9.1 release cycle OpenSSH 9.3 has been released. Close resolved bugs |