|
Message-ID: <20110624130517.GA18027@dztty> Date: Fri, 24 Jun 2011 14:05:17 +0100 From: Djalal Harouni <tixxdz@...ndz.org> To: oss-security@...ts.openwall.com Subject: Re: CVE request: crypt_blowfish 8-bit character mishandling On Mon, Jun 20, 2011 at 09:01:11AM +0400, Solar Designer wrote: > Oh, also some builds of crypt_blowfish (and of affected systems/apps) > for PowerPC are probably unaffected, because char is typically unsigned > there (unless overridden in compiler flags for compatibility with more > typical systems). Just to add that on some (perhaps all) ARM plateforms char is by default: "unsigned" (unless you compile with -fsigned-char as you have noted). This is an old link that expose some problems when you just use 'char var' on ARM (perhaps not only on ARM): http://www.arm.linux.org.uk/docs/faqs/signedchar.php -- tixxdz http://opendz.org
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.