BBS:      TELESC.NET.BR
Assunto:  src/ssh/kex/curve25519-sha256.c dh-gex-sha256.c src/ssh/key_algo/rsa-s
De:       Deuc¨
Data:     Wed, 25 Mar 2026 23:06:00 -0700
-----------------------------------------------------------
https://gitlab.synchro.net/main/sbbs/-/commit/c4f45ec61d6977c200170917
Modified Files:
	src/ssh/kex/curve25519-sha256.c dh-gex-sha256.c src/ssh/key_algo/rsa-sha2-256.c src/ssh/ssh-auth.c ssh-chan.c ssh-conn.c ssh-trans.c
Log Message:
Guard all arithmetic against overflow and underflow

Every size computation before malloc is now checked against
SIZE_MAX to prevent wrapping on platforms with small size_t.
Cumulative counters (bytes_since_rekey, bytebuf total, msgqueue
total_bytes/count) use saturating adds.  Channel capacity
doubling checks SIZE_MAX/2 and SIZE_MAX/sizeof(*).

Co-Authored-By: Claude Opus 4.6 (1M context) 
n
---
  mSynchronetn  hgVertrauen n hHome of Synchronet n gh[vert/cvs/bbs].synchro.net

-----------------------------------------------------------
[Voltar]