- (Mar 7 2009) Olivier Hervieu pointed out a flaw in the
libssh2_channel_x11_req_ex() function that made it produce a crappy random chunk of data. Peter Stuge improved the fix to not do out-of-boundary writes. I (Daniel Stenberg) replaced the snprintf() with a plain sprintf() since the size argument wasn't adding anything anyway.
Этот коммит содержится в:
родитель
16941e1fcf
Коммит
5f32304805
6
NEWS
6
NEWS
@ -1,4 +1,10 @@
|
|||||||
|
|
||||||
|
- (Mar 7 2009) Olivier Hervieu pointed out a flaw in the
|
||||||
|
libssh2_channel_x11_req_ex() function that made it produce a crappy random
|
||||||
|
chunk of data. Peter Stuge improved the fix to not do out-of-boundary
|
||||||
|
writes. I (Daniel Stenberg) replaced the snprintf() with a plain sprintf()
|
||||||
|
since the size argument wasn't adding anything anyway.
|
||||||
|
|
||||||
- (Feb 23 2009) Added libssh2_version()
|
- (Feb 23 2009) Added libssh2_version()
|
||||||
|
|
||||||
- (Feb 20 2009) libssh2_channel_direct_tcpip_ex() bug #1902169 fixed, which
|
- (Feb 20 2009) libssh2_channel_direct_tcpip_ex() bug #1902169 fixed, which
|
||||||
|
@ -1093,11 +1093,15 @@ libssh2_channel_x11_req_ex(LIBSSH2_CHANNEL * channel, int single_connection,
|
|||||||
memcpy(s, auth_cookie, cookie_len);
|
memcpy(s, auth_cookie, cookie_len);
|
||||||
} else {
|
} else {
|
||||||
int i;
|
int i;
|
||||||
unsigned char buffer[LIBSSH2_X11_RANDOM_COOKIE_LEN / 2];
|
/* note: the extra +1 below is necessary since the sprintf()
|
||||||
|
loop will always write 3 bytes so the last one will write
|
||||||
|
the trailing zero at the LIBSSH2_X11_RANDOM_COOKIE_LEN/2
|
||||||
|
border */
|
||||||
|
unsigned char buffer[(LIBSSH2_X11_RANDOM_COOKIE_LEN / 2) +1];
|
||||||
|
|
||||||
libssh2_random(buffer, LIBSSH2_X11_RANDOM_COOKIE_LEN / 2);
|
libssh2_random(buffer, LIBSSH2_X11_RANDOM_COOKIE_LEN / 2);
|
||||||
for(i = 0; i < (LIBSSH2_X11_RANDOM_COOKIE_LEN / 2); i++) {
|
for(i = 0; i < (LIBSSH2_X11_RANDOM_COOKIE_LEN / 2); i++) {
|
||||||
snprintf((char *) s + (i * 2), 2, "%02X", buffer[i]);
|
sprintf((char *)&s[i*2], "%02X", buffer[i]);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
s += cookie_len;
|
s += cookie_len;
|
||||||
|
Загрузка…
x
Ссылка в новой задаче
Block a user