Revert "Cap the maximum SFTP write value to 32768 bytes"
This bug will now be fixed in curl as part of the upstream PR:35eb2614d8
This reverts commit0e94b4d5ee
. Related: RHEL-5485
This commit is contained in:
parent
0e94b4d5ee
commit
d03f6acd77
@ -1,6 +1,6 @@
|
||||
Name: libssh
|
||||
Version: 0.9.6
|
||||
Release: 13%{?dist}
|
||||
Release: 12%{?dist}
|
||||
Summary: A library implementing the SSH protocol
|
||||
License: LGPLv2+
|
||||
URL: http://www.libssh.org
|
||||
@ -17,7 +17,6 @@ Patch2: null_dereference_rekey.patch
|
||||
Patch3: auth_bypass.patch
|
||||
Patch4: fix_tests.patch
|
||||
Patch5: covscan23.patch
|
||||
Patch6: sftp_write_cap.patch
|
||||
|
||||
BuildRequires: cmake
|
||||
BuildRequires: doxygen
|
||||
@ -146,10 +145,6 @@ popd
|
||||
%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/libssh/libssh_server.config
|
||||
|
||||
%changelog
|
||||
* Wed Sep 20 2023 Sahana Prasad <sahana@redhat.com> - 0.9.6-13
|
||||
- Cap the maximum SFTP write value to 32768 bytes
|
||||
- Resolves: RHEL-5485
|
||||
|
||||
* Mon May 15 2023 Norbert Pocs <npocs@redhat.com> - 0.9.6-12
|
||||
- Fix loglevel regression
|
||||
- Related: rhbz#2182251, rhbz#2189742
|
||||
|
@ -1,34 +0,0 @@
|
||||
diff -up libssh-0.10.4/include/libssh/sftp.h-cap libssh-0.10.4/include/libssh/sftp.h
|
||||
--- libssh-0.10.4/include/libssh/sftp.h-cap 2023-09-19 11:28:41.304353437 +0200
|
||||
+++ libssh-0.10.4/include/libssh/sftp.h 2023-09-19 11:34:20.828666252 +0200
|
||||
@@ -550,6 +550,10 @@ LIBSSH_API int sftp_async_read(sftp_file
|
||||
/**
|
||||
* @brief Write to a file using an opened sftp file handle.
|
||||
*
|
||||
+ * The maximum size of the SFTP packet payload is 32768 bytes so the count
|
||||
+ * parameter is capped at this value. This is low-level function so it does not
|
||||
+ * try to send more than this amount of data.
|
||||
+ *
|
||||
* @param file Open sftp file handle to write to.
|
||||
*
|
||||
* @param buf Pointer to buffer to write data.
|
||||
diff -up libssh-0.10.4/src/sftp.c-cap libssh-0.10.4/src/sftp.c
|
||||
--- libssh-0.10.4/src/sftp.c-cap 2023-09-19 11:29:02.897569013 +0200
|
||||
+++ libssh-0.10.4/src/sftp.c 2023-09-19 11:30:36.827506743 +0200
|
||||
@@ -2179,6 +2179,16 @@ ssize_t sftp_write(sftp_file file, const
|
||||
|
||||
id = sftp_get_new_id(file->sftp);
|
||||
|
||||
+ /* limit the writes to the maximum specified in Section 3 of
|
||||
+ * https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-02
|
||||
+ *
|
||||
+ * FIXME: This value should be adjusted to the value from the
|
||||
+ * limits@openssh.com extension if supported
|
||||
+ * TODO: We should iterate over the blocks rather than writing less than
|
||||
+ * requested to provide less surprises to the calling applications.
|
||||
+ */
|
||||
+ count = count > 32768 ? 32768 : count;
|
||||
+
|
||||
rc = ssh_buffer_pack(buffer,
|
||||
"dSqdP",
|
||||
id,
|
Loading…
Reference in New Issue
Block a user