]> code.ossystems Code Review - openembedded-core.git/commit
openssh: fix potential signed overflow in pointer arithmatic
authorHongxu Jia <hongxu.jia@windriver.com>
Mon, 17 Jun 2019 02:17:41 +0000 (22:17 -0400)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Tue, 18 Jun 2019 10:19:37 +0000 (11:19 +0100)
commit1c4b8d797c76a08ebd1658066e9d32972b6abe58
treee0c90cca9f8c5a7a35d071d82c047355cbc005ac
parent27744ad292c9d7e57ebcf7c3c30acbd85aac77a4
openssh: fix potential signed overflow in pointer arithmatic

Pointer arithmatic results in implementation defined signed integer
type, so that 'd - dst’ in strlcat may trigger signed overflow if
pointer ‘d’ is near 0x7fffffff in 32 bits system. In case of ompilation
by gcc or clang with -ftrapv option, the overflow would generate
program abort.

Signed-off-by: hguo3 <heng.guo@windriver.com>
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-connectivity/openssh/openssh/fix-potential-signed-overflow-in-pointer-arithmatic.patch