mirror of
https://github.com/hashcat/hashcat
synced 2025-01-10 17:16:22 +01:00
Fixed out-of-boundary reads in case user activates -S for fast but pure hashes in -a 1 or -a 3 mode
This commit is contained in:
parent
0ba77fe761
commit
9a87d5aa01
@ -46,6 +46,7 @@
|
||||
- Fixed incorrect maximum password length support for -m 400 in optimized mode (reduced from 55 to 39)
|
||||
- Fixed internal access on module option attribute OPTS_TYPE_SUGGEST_KG with the result that it was unused
|
||||
- Fixed invalid handling of outfile folder entries for -m 22000
|
||||
- Fixed out-of-boundary reads in case user activates -S for fast but pure hashes in -a 1 or -a 3 mode
|
||||
- Fixed password reassembling for cracked hashes on host for slow hashes in optimized mode that are longer than 32 characters
|
||||
- Fixed race condition in potfile check during removal of empty hashes
|
||||
- Fixed race condition resulting in out of memory error on startup if multiple hashcat instances are started at the same time
|
||||
|
@ -10613,7 +10613,9 @@ int backend_session_begin (hashcat_ctx_t *hashcat_ctx)
|
||||
// this is required because inside the kernels there is this:
|
||||
// __local pw_t s_pws[64];
|
||||
|
||||
if ((user_options->attack_mode == ATTACK_MODE_STRAIGHT) || (user_options->attack_mode == ATTACK_MODE_ASSOCIATION))
|
||||
if ((user_options->attack_mode == ATTACK_MODE_STRAIGHT)
|
||||
|| (user_options->attack_mode == ATTACK_MODE_ASSOCIATION)
|
||||
|| (user_options->slow_candidates == true))
|
||||
{
|
||||
if (hashconfig->attack_exec == ATTACK_EXEC_INSIDE_KERNEL)
|
||||
{
|
||||
|
Loading…
Reference in New Issue
Block a user