Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20120627111124.GA17288@openwall.com>
Date: Wed, 27 Jun 2012 15:11:24 +0400
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: SSH format crashes when built using "linux-x86-clang-debug"

On Wed, Jun 27, 2012 at 12:20:43PM +0200, magnum wrote:
> On 2012-06-27 12:01, Solar Designer wrote:
> > On Wed, Jun 27, 2012 at 11:48:55AM +0200, magnum wrote:
> >> When/how would it read beyond bound? I don't get it.
> > 
> > salt() returns a pointer to a static variable for the salt.  The
> > compiler knows the size of this variable.  SALT_SIZE is larger.
> > bench.c and loader.c would memcpy() the larger size.  This is correctly
> > detected as read beyond bound.
> 
> OK. But this had nothing to do with the crashes, right?

It could result in crashes when a bound-checking compiler was used.

I don't know whether this was the case on Erik's system.  Probably not.
If so, another crash bug still exists in that code.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.