From: Damien Miller Date: Thu, 27 Feb 2014 23:00:57 +0000 (+1100) Subject: - djm@cvs.openbsd.org 2014/02/27 08:25:09 X-Git-Tag: V_6_6_P1~14 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=172ec7e0af1a5f1d682f6a2dca335c6c186153d5;p=thirdparty%2Fopenssh-portable.git - djm@cvs.openbsd.org 2014/02/27 08:25:09 [bufbn.c] off by one in range check --- diff --git a/ChangeLog b/ChangeLog index 416f4b58c..f91963720 100644 --- a/ChangeLog +++ b/ChangeLog @@ -4,6 +4,9 @@ [bufbn.c] fix unsigned overflow that could lead to reading a short ssh protocol 1 bignum value; found by Ben Hawkes; ok deraadt@ + - djm@cvs.openbsd.org 2014/02/27 08:25:09 + [bufbn.c] + off by one in range check 20140227 - OpenBSD CVS Sync diff --git a/bufbn.c b/bufbn.c index 40e8ed4d5..1d2e01266 100644 --- a/bufbn.c +++ b/bufbn.c @@ -1,4 +1,4 @@ -/* $OpenBSD: bufbn.c,v 1.10 2014/02/27 00:41:49 djm Exp $*/ +/* $OpenBSD: bufbn.c,v 1.11 2014/02/27 08:25:09 djm Exp $*/ /* * Author: Tatu Ylonen * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland @@ -108,7 +108,7 @@ buffer_get_bignum_ret(Buffer *buffer, BIGNUM *value) return (-1); } bits = get_u16(buf); - if (bits > 65536-7) { + if (bits > 65535-7) { error("buffer_get_bignum_ret: cannot handle BN of size %d", bits); return (-1);