[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Bug#866890: pspp - cve-2017-10791 - cve-2017-10792
From: |
John Darrington |
Subject: |
Re: Bug#866890: pspp - cve-2017-10791 - cve-2017-10792 |
Date: |
Tue, 4 Jul 2017 07:10:31 +0200 |
User-agent: |
Mutt/1.5.23 (2014-03-12) |
On Mon, Jul 03, 2017 at 11:37:30PM +0200, Friedrich Beckmann wrote:
Hi John,
today I looked a little bit at the hash function. I think the problem is
that compared to
the referenced code the x parameter is type int instead of unsigned int.
Googling around the
overflow behavior of signed and the shift right of signed is not defined
in the c standard
although ???many?" implementations assume 2th complement signed
implementation. Both is well
defined for unsigned int operations.
Ahh. Perhaps you're right. But I cannot see that this would cause a crash, so
I suspect that's
another problem.
I changed the parameter type from int to unsigned int and I cannot see a
problem in the regression.
What problems did you encounter before your change (if any)?
But looking at the code I wondered if this hash function also works on 64
Bit architectures. The
reference only talks about uint32_t.
I cannot see that it wouldn't "work". But it might not create such an
efficient hash.
Anyway maybe Ben will be able to have a look soon.
J'
--
Avoid eavesdropping. Send strong encrypted email.
PGP Public key ID: 1024D/2DE827B3
fingerprint = 8797 A26D 0854 2EAB 0285 A290 8A67 719C 2DE8 27B3
See http://sks-keyservers.net or any PGP keyserver for public key.
signature.asc
Description: Digital signature