Displaying 20 results from an estimated 6000 matches similar to: "[Bug 1048] scp.c xstrdup() memory leak?"
2010 Mar 23
5
[Bug 1738] New: openbsd-compat wants xstrdup but it's in libssh.a
https://bugzilla.mindrot.org/show_bug.cgi?id=1738
Summary: openbsd-compat wants xstrdup but it's in libssh.a
Product: Portable OpenSSH
Version: 5.4p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Build system
AssignedTo: unassigned-bugs at mindrot.org
2012 Dec 17
15
[Bug 2052] New: Memory leak when SSH login and logout
https://bugzilla.mindrot.org/show_bug.cgi?id=2052
Bug ID: 2052
Summary: Memory leak when SSH login and logout
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.1p1
Hardware: MIPS
OS: Linux
Status: NEW
Severity: major
Priority: P5
Component: sshd
Assignee:
2000 Sep 09
0
2.2.0p1 PATCH: ssh/scp/slogin will invoke ssh-askpass
Enclosed is a patch against 2.2.0p1 that teaches ssh (and therefore
slogin and scp) how to invoke ssh-askpass to request a password,
RSA/DSA key passphrase, or an skey challenge response.
I've tested this on Linux (i386), for passwords and RSA/DSA key
passphrases. I cannot easily test whether the Right Thing will happen
for skey challenge responses; I would appreciate it if someone who
uses
2022 Nov 11
1
Memory leak, make_absolute_pwd_glob
We had one more report from Coverity Scan after we brought 9.1p1 into
the FreeBSD base system. It complains that calls like "path1 =
make_absolute_pwd_glob(path1, *pwd);" in sftp.c leak the allocation.
All make_absolute_pwd_glob() calls but one are of that form, so
perhaps have it consume and free the first arg, as below (and
https://reviews.freebsd.org/D37253)?
diff --git
2005 Jun 12
2
%h,%p,%u expansion for ControlPath
This allows me to set 'ControlPath ~/.ssh/sockets/%h.%p.%u' for example.
Have I missed a good reason why ssh_connect finds the default port
number for itself instead of just having it in options.port (like we do
for the the default in options.user)?
--- openssh-4.1p1/ssh.c~ 2005-06-12 09:47:18.000000000 +0100
+++ openssh-4.1p1/ssh.c 2005-06-12 09:40:53.000000000 +0100
@@ -604,6 +604,17
2003 Jan 27
1
scp -l on man page?
Hello,
I noticed:
20030124
- (djm) OpenBSD CVS Sync
- markus at cvs.openbsd.org 2003/01/23 14:01:53
[scp.c]
bandwidth limitation patch (scp -l) from niels@; ok todd@, deraadt@
[...]
2004 Aug 31
1
[PATCH] supporting a remote scp path option in scp
Hi there,
I've written some enhancements to scp.c and pathnames.h to enable the scp
to arbitrarily set the remote scp path.
(eg $ scp -e /usr/bin/scp foo user at bar:foo)
I did read the "scp: command not found" FAQ entry but I'm not quite sure
why we can't do this, unless it's because enhancements to scp are no
longer a priority. Any other reason why it "is the
2006 May 15
2
[PATCH 10/12 bugfix: openssh-4.3p2: memory leak
The variable local_user was allocated by xstrdup and is not freed or
pointed to in this branch. This patch adds the xfree. This entire set
of patches passed the regression tests on my system. Bug found by
Coverity.
Signed-off-by: Kylene Hall <kjhall at us.ibm.com>
---
sshconnect.c | 1 +
1 files changed, 1 insertion(+)
diff -uprN openssh-4.3p2/sshconnect.c
2000 Jul 12
0
Announce: portable OpenSSH 2.1.1p3
The 2.1.1p3 release of portable OpenSSH has been uploaded to the
OpenBSD ftp master site. In a few hours it will be available from one
of the many mirrors listed at:
http://www.openssh.com/portable.html
This release fixes several bugs reported since the previous release
and extends portability to NeXT and Reliant Unix.
As usual, the OpenBSD team has been hard at work further polishing and
2000 Jul 12
0
Announce: portable OpenSSH 2.1.1p3
The 2.1.1p3 release of portable OpenSSH has been uploaded to the
OpenBSD ftp master site. In a few hours it will be available from one
of the many mirrors listed at:
http://www.openssh.com/portable.html
This release fixes several bugs reported since the previous release
and extends portability to NeXT and Reliant Unix.
As usual, the OpenBSD team has been hard at work further polishing and
2001 Feb 19
0
[PATCH]: Broken scp -p option
Hi,
I have found an serious problem when using 'scp -rp'. The usage of
the static buffer "namebuf" together with calling `sink()' recursively
results in overwriting the buffer np points to. This in turn results
in a broken call to `ulimits()' and `chmod'.
This patch solves the problem:
Index: scp.c
===================================================================
2006 May 15
0
[PATCH 5/12] bug fix: openssh-4.3p2 scp bugs
There are 2 bugs here. The first is pipe's return code is not checked
in this instance and it can return a negative value. The purpose of the
call is to make sure 0 and 1 are not assigned to the pin and pout
descriptors because those values won't work for later calls. If the
pipe call fails the correct behavior cannot be ensured. This patch adds
an error case consistent with the rest
2001 Feb 16
1
OpenSSH 2.3.0p1 port to BSDI BSD/OS
BSD/OS 4.2 comes with OpenSSH 2.1.1p4, patched to support BSDI's
authentication library. However, BSDI's patches have several
problems:
1. They don't run the approval phase, so they can allow users to login
who aren't supposed to be able to.
2. They don't patch configure to automatically detect the BSDI auth
system, so they're not ready to use in a general portable
2002 Dec 29
0
[Bug 459] New: ssh-keygen doesn't know how to export private keys
http://bugzilla.mindrot.org/show_bug.cgi?id=459
Summary: ssh-keygen doesn't know how to export private keys
Product: Portable OpenSSH
Version: 3.5p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh-keygen
AssignedTo: openssh-unix-dev at mindrot.org
2009 Mar 31
2
Memory leak in do_ssh2_kex()
Hi guys
Apparently, there is small memory leak in the do_ssh2_kex() routine in sshd.c.
Line 2195 in sshd.c states:
myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = list_hostkey_types();
Where list_hostkey_types() returns a pointer allocated by the xstrdup call (line 735). This pointer should be freed in the calling routine do_ssh2_key().
Should I make a patch for this?
Also, since my previous patch
2009 Apr 01
3
[Bug 1582] New: memory leak in do_ssh2_kex() routine (sshd.c)
https://bugzilla.mindrot.org/show_bug.cgi?id=1582
Summary: memory leak in do_ssh2_kex() routine (sshd.c)
Product: Portable OpenSSH
Version: 5.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2000 May 09
1
2.9: remote port forwarding doesn't work
Hello,
I'm running OpenBSD 2.9 (-rOPENBSD_2_9) on i386. Remote port forwarding
doesn't work. Attached are 2 logs of
ssh -v -R2828:localhost:22 localhost
and
sshd -p 2222 -d
Note that server tries to forward to
Connection to port 2828 forwarding to 0.0.0.0 port 0 requested.
instead of localhost port 22 as it should.
what ssh, what sshd and /etc/sshd_config are also attached.
Thanks
2005 Jul 26
1
Linux in-kernel keys support
Hi all,
I recently made a patch to openssh 4.1p1 to allow it to use the
in-kernel key management provided by 2.6.12 or later Linux kernels.
I've attached the patch (which is still only a proof-of-concept, for
instance its very verbose right now) to this mail.
Now, my question is, is this a completely insane idea and would (a later
version of) the patch have a chance of making it into the
2000 Oct 07
0
OpenSSH changes for BSD/OS
The following are patches against openssh 2.1.1p4 to add
support for the BSD_AUTH authentication mechanisms. It allows the
use of non-challenge/response style mechanisms (which styles are
allowed my be limited by appropriate auth-ssh entries in login.conf).
The patches also add support for calling setusercontext for the
appropriate class when called with a command (so that the PATH, limits,
2006 May 14
1
scp patch to delete source files after copy
At work we have a large collection of scripts to move log
and config files around. These depend on commercial (F-Secure)
ssh/scp, as it supports the -u option to delete the source file
after (successful) copying. That is the sole reason we can't
run openssh on our 150+ unix boxes.
I have attached a patch below, which adds the -u option to
delete the source file after copying, provided there