Displaying 9 results from an estimated 9 matches for "buffer_get_string_ret".
2007 Sep 06
1
openssh 4.6p1 closing connection with strange packet length
server is running openssh 4.6p1 on linux x86 (32bit)
client is running openssh 4.6p1 on linux x86_64 (64bit)
Just connecting from the client to the server and running "top" long
enough results in:
Disconnecting: Bad packet length 3690378913.
This seems like a 32/64 bit problem to me.
--
Andreas Steinmetz SPAMmers use robotrap at domdv.de
2014 Mar 03
6
[Bug 2207] New: Potential NULL deference, found using coverity
...if statement
path:/c/amesh/142/src/crypto/openssh/authfile.c:307:
cond_false: Condition "nkeys != 1", taking false branch
path:/c/amesh/142/src/crypto/openssh/authfile.c:310:
if_end: End of if statement
path:/c/amesh/142/src/crypto/openssh/authfile.c:312:
cond_false: Condition "(cp = buffer_get_string_ret(©, &len)) ==
NULL", taking false branch
path:/c/amesh/142/src/crypto/openssh/authfile.c:315:
if_end: End of if statement
path:/c/amesh/142/src/crypto/openssh/authfile.c:322:
cond_false: Condition "len < blocksize", taking false branch
path:/c/amesh/142/src/crypto/opens...
2012 May 03
5
[PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
These patches implement a new mux client request to list the currently opened
TCP forwardings. It also removes some todos regarding keeping the list
of forwardings in the options up-to-date.
Bert Wesarg (6):
attach the forwarding type to struct Forward
merge local and remote forward lists
generate unique ids for forwardings to be used for identification
remove closed forwardings from
2010 Jan 14
1
ssh(1) multiplexing rewrite
...;Unsupported multiplexing protocol version %d "
+ "(expected %d)", ver, SSHMUX_VER);
+ return -1;
+ }
+ debug2("%s: channel %d slave version %u", __func__, c->self, ver);
+
+ /* No extensions are presently defined */
+ while (buffer_len(m) > 0) {
+ char *name = buffer_get_string_ret(m, NULL);
+ char *value = buffer_get_string_ret(m, NULL);
+
+ if (name == NULL || value == NULL) {
+ if (name != NULL)
+ xfree(name);
+ goto malf;
}
- buffer_free(&m);
- close(client_fd);
- return start_close;
- default:
- error("Unsupported command %d", mux_command);...
2005 Nov 04
1
[Bug 1109] Memory leak in file: bufaux.c, function: buffer_get_bignum2_ret
...Version: 4.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
ReportedBy: kremenek at cs.stanford.edu
Memory allocated by the call to buffer_get_string_ret may be lost on one of the
two error paths.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2010 Apr 02
3
[Bug 1749] New: ssh-keygen cant "import" a generic x509 rsa public key
...part defect part enhancement.
Defect Part
===========
I have a public key generated via
prompt> openssl x509 -in cavanaug.x509 -pubkey -noout >
cavanaug_x509.pub
that I would like to have ssh-keygen convert to an openssh public key
format.
prompt> ssh-keygen -i -f cavanaug_x509.pub
buffer_get_string_ret: bad string length 813826338
key_from_blob: can't read key type
decode blob failed.
prompt> cat cavanaug_x509.pub
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApy+8jp5YdUEqoNjmhg3X
c+oMARMrXH5erMRh+C1DeAE/KxZd0ZXjhbDJ1NwvvIlmLJO6tmlqtbnNILgpJjna
dPor6fcVsiLgHtwD5Cuy...
2015 Apr 23
3
double length prefix in ssh-keygen certificates (values of critical options)
...39 00 00 00 16 00 00 00 0e 70 65
|2.0/29........pe|
- so before the value of force-command, there is a single length offset 00
00 00 0b, and before the IP address - a single length offset: 00 00 00 0d
ssh-keygen -L on such a Go-generated certificate gives the following error:
Critical Options:
buffer_get_string_ret: bad string length 796159344
buffer_get_string: buffer error
The "bad string length" is easily explained - the decimal 796159344 is
0x2f746d70 which comes from the bytes 2f 74 6d 70 - "*/tmp*" in the
"/tmp/foobar" string value of the force-command critical option. I...
2005 Nov 17
3
4.2 and the 'last' command
We've run into an interesting dilemma regarding last log information and
ssh 4.2p1. In 3.8, we didn't see this problem, but now has cropped up
in 4.2.
When a user logs in, sshd seems to call 'last' to get the last log
information. 'last' then opens the /var/log/wtmp file and processes the
information. On some systems, this file can be quite large, and we're
seeing
2007 Sep 11
11
[Bug 1360] New: Connection aborted on large data -R transfer
...EMOTE host to port 2852.
Actual results:
local ssh:
debug1: channel 3: new [127.0.0.1]
debug1: confirm forwarded-tcpip
debug3: channel 3: waiting for connection
debug1: channel 3: connected
...debug2: channel 3: window 935334 sent adjust 1161818
debug2: channel 3: window 966656 sent adjust 1130496
buffer_get_string_ret: bad string length 557056
buffer_get_string: buffer error
It seems to be a new regression in 4.7p1.
See also https://bugzilla.redhat.com/show_bug.cgi?id=286181
and
http://lists.mindrot.org/pipermail/openssh-unix-dev/2007-September/025661.html
--
Configure bugmail: http://bugzilla.mindrot.org/u...