bugzilla-daemon at bugzilla.mindrot.org
2008-Nov-23 14:42 UTC
[Bug 1539] New: double-free when failing to parse a forwarding specification given using ~C
https://bugzilla.mindrot.org/show_bug.cgi?id=1539 Summary: double-free when failing to parse a forwarding specification given using ~C Product: Portable OpenSSH Version: 5.1p1 Platform: ix86 URL: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=50533 0 OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: unassigned-bugs at mindrot.org ReportedBy: cjwatson at debian.org Created an attachment (id=1581) --> (http://bugzilla.mindrot.org/attachment.cgi?id=1581) fix double-free if parsing forwarding specification fails Arthur de Jong reported that ssh can be made to crash with a double-free as follows: % ssh somehost [...] % ~C ssh> -L *.80:localhost:80 Bad forwarding specification. *** glibc detected *** ssh: double free or corruption (fasttop): 0xb95431b0 *** This is because parse_forward frees fwd->connect_host and fwd->listen_host but doesn't set them to NULL, and so process_cmdline tries to free them again. Patch attached. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2008-Dec-07 22:32 UTC
[Bug 1539] double-free when failing to parse a forwarding specification given using ~C
https://bugzilla.mindrot.org/show_bug.cgi?id=1539 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |djm at mindrot.org Blocks| |1481 --- Comment #1 from Damien Miller <djm at mindrot.org> 2008-12-08 09:32:11 --- on the 5.2 list -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2008-Dec-09 03:13 UTC
[Bug 1539] double-free when failing to parse a forwarding specification given using ~C
https://bugzilla.mindrot.org/show_bug.cgi?id=1539 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |FIXED --- Comment #2 from Damien Miller <djm at mindrot.org> 2008-12-09 14:13:06 --- patch applied, will be in openssh-5.2 - thanks! -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2009-Jan-06 20:59 UTC
[Bug 1539] double-free when failing to parse a forwarding specification given using ~C
https://bugzilla.mindrot.org/show_bug.cgi?id=1539 Ian Gallagher <mindrot-bugzilla at cdine.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |mindrot-bugzilla at cdine.org --- Comment #3 from Ian Gallagher <mindrot-bugzilla at cdine.org> 2009-01-07 07:59:27 --- *** Bug 1548 has been marked as a duplicate of this bug. *** -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2009-Feb-23 02:36 UTC
[Bug 1539] double-free when failing to parse a forwarding specification given using ~C
https://bugzilla.mindrot.org/show_bug.cgi?id=1539 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED --- Comment #4 from Damien Miller <djm at mindrot.org> 2009-02-23 13:36:39 --- Close bugs fixed/reviewed for openssh-5.2 release -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
Reasonably Related Threads
- [Bug 1380] New: incorrect check for strlen(fwd->connect_host) in parse_forward()
- [Bug 1379] New: memory leak in process_cmdline()
- ssh(1) multiplexing rewrite
- [PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
- [Bug 1548] New: Double free in OpenSSH clientloop.c/xmalloc.c via cmdline port forwarding