bugzilla-daemon at mindrot.org
2005-Mar-14 12:34 UTC
[Bug 896] Improper Input buffer handling
http://bugzilla.mindrot.org/show_bug.cgi?id=896 dtucker at zip.com.au changed: What |Removed |Added ---------------------------------------------------------------------------- Status|ASSIGNED |RESOLVED Resolution| |FIXED ------- Additional Comments From dtucker at zip.com.au 2005-03-14 23:34 ------- This has now been fixed in OpenBSD, Portable HEAD and the 4.0 branch, although not in the same way as the patches here; it will allow approximately 10MB of buffer usage before halting the read()s, and the buffer code is now a bit more aggressive about compacting consumed buffers. It tests OK with a pathological hacked client (ie one that sets a window size of 2^32-1). Thanks for the report. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.