Displaying 20 results from an estimated 1000 matches similar to: "[Bug 3539] New: sshbuf memory leak in recv_rexec_state()"
2024 Aug 13
1
[PATCH] harden parent-child check in sshbuf.c
This simple additional check hardens sshbuf against linking an
sshbuf into itself as parent/child pair, which could lead to ref
counting issues.
Purely defensive measure. I am not aware that this could happen
somehwere in the code by now.
Okay?
Index: sshbuf.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/sshbuf.c,v
diff -u -p -u -p -r1.19
2023 Feb 16
2
[Bug 3540] New: fix minor memory leak for kex_names_cat() returned string
https://bugzilla.mindrot.org/show_bug.cgi?id=3540
Bug ID: 3540
Summary: fix minor memory leak for kex_names_cat() returned
string
Product: Portable OpenSSH
Version: 9.1p1
Hardware: All
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: ssh
2024 Aug 13
2
[PATCH] Fix typos in sshbuf.c
This patch fixes two spelling mistakes in code comments,
which means no functional change:
still-extant -> still-existant
the -> then
Okay?
Index: sshbuf.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/sshbuf.c,v
diff -u -p -u -p -r1.19 sshbuf.c
--- sshbuf.c 2 Dec 2022 04:40:27 -0000 1.19
+++ sshbuf.c 13 Aug 2024 16:39:12 -0000
@@
2020 Apr 26
2
[PATCH] Fix line-wrapping typo in comment
---
sshbuf.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/sshbuf.h b/sshbuf.h
index 78e32264..4b71405a 100644
--- a/sshbuf.h
+++ b/sshbuf.h
@@ -140,7 +140,7 @@ int sshbuf_allocate(struct sshbuf *buf, size_t len);
/*
* Reserve len bytes in buf.
* Returns 0 on success and a pointer to the first reserved byte via the
- * optional dpp parameter or a negative * SSH_ERR_*
2024 Aug 13
1
[PATCH] Reorder calloc arguments
Reordering calloc arguments silences gcc compiler warnings of
latest versions. Spotted with OpenSSH-portable on a Linux system.
Okay?
Index: cipher.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/cipher.c,v
diff -u -p -u -p -r1.121 cipher.c
--- cipher.c 17 May 2024 02:39:11 -0000 1.121
+++ cipher.c 13 Aug 2024 16:46:00 -0000
@@ -249,7 +249,7
2024 Feb 03
1
a little note on sshbuf_reset()
Hello!
I have a minor observation about code in sshbuf.c, not sure if it would be
useful, but here it is.
sshbuf_reset() is currently implemented like this:
void
sshbuf_reset(struct sshbuf *buf)
{
u_char *d;
if (buf->readonly || buf->refcount > 1) {
/* Nonsensical. Just make buffer appear empty */
buf->off = buf->size;
return;
}
if (sshbuf_check_sanity(buf) != 0)
2015 Mar 24
5
[Bug 2371] New: make check fails when using --without-openssl on AIX
https://bugzilla.mindrot.org/show_bug.cgi?id=2371
Bug ID: 2371
Summary: make check fails when using --without-openssl on AIX
Product: Portable OpenSSH
Version: 6.9p1
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: Build system
Assignee:
2015 Mar 24
5
[Bug 2371] New: make check fails when using --without-openssl on AIX
https://bugzilla.mindrot.org/show_bug.cgi?id=2371
Bug ID: 2371
Summary: make check fails when using --without-openssl on AIX
Product: Portable OpenSSH
Version: 6.9p1
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: Build system
Assignee:
2014 Aug 26
1
Call for testing: OpenSSH 6.7
Good news/Bad News
The test race in RHEL 3.4 seems to be gone ... but another ec.h failure ...
Using http://www.mindrot.org/openssh_snap/openssh-SNAP-20140827.tar.gz
OS Build_Target CC
OpenSSL BUILD TEST
============== =========================== ================
============= ====== =================
*RHEL 3.4 i386-redhat-linux gcc
2024 Feb 01
1
A couple of questions about OpenSSH codebase
Hello!
I'm sorry in advance if I'm asking stupid questions, this is my first time
dealing with a development list, so please excuse me if something is wrong
with this message...
I'm pretty interested in the OpenSSH codebase, and a couple of questions
arose while I was investigating it, and I guess this is the place where I
can find answers.
1. There are a lot of allocations, even for
2007 Mar 24
2
[Bug 505] iptables-save still doesn't like quotes
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=505
------- Additional Comments From mbr@cipherdyne.org 2007-03-24 06:01 MET -------
I've tested the proposed patch against the iptables-1.3.7 source, and find that
it works in the reported broken case:
# iptables -A INPUT -m string --algo kmp --string 111\"222 -j LOG
# ./iptables-save > ipt.out
# ./iptables-restore
2023 Feb 24
1
[PATCH 1/1] Add support for ZSTD compression
From: Sebastian Andrzej Siewior <sebastian at breakpoint.cc>
The "zstd at breakpoint.cc" compression algorithm enables ZSTD based
compression as defined in RFC8478. The compression is delayed until the
server sends the SSH_MSG_USERAUTH_SUCCESS which is the same time as with
the "zlib at openssh.com" method.
Signed-off-by: Sebastian Andrzej Siewior <sebastian at
2011 Sep 25
0
sshd 5.6p1 does not accept connections in fips mode
Hi,
I was trying to run sshd after applying the fips patches mentioned in
http://www.gossamer-threads.com/lists/engine?do=post_attachment;postatt_id=1835;list=openssh
but for some reason sshd refuses to accept the connection. I guess I do
something terribly wrong. Is there a reason that this is bound to fail?
These 5.6 patches were the most recent I could find. Are there any fips
patches
2012 Jan 28
1
PATCH: Support for encrypted host keys
Hello all,
I recently found myself wanting to run sshd with passphrase-protected host keys rather than the usual unencrypted format, and was somewhat surprised to discover that sshd did not support this. I'm not sure if there's any particular reason for that, but I've developed the below patch (relative to current CVS at time of writing) that implements this. It prompts for the
2024 May 06
1
Feature request/EOI: Match interactive config?
On Sat, 4 May 2024, openssh at tr.id.au wrote:
> Hey there,
>
> I often want different behavior in my ssh client depending on
> whether I'm logging into an interactive session or running
> a remote non-interactive command. We can see at, say,
> https://unix.stackexchange.com/a/499562/305714 that this isn't a
> unique wish, and existing solutions are kind of baroque.
2006 Feb 14
15
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131
------- Comment #5 from dtucker at zip.com.au 2006-02-14 22:17 -------
Also, what compiler did you use to compile OpenSSH? If you compile OpenSSH
(and openssl and zlib if possible) with optimization disabled (-O0) does the
error still occur?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are
2012 Aug 28
1
psad Error
Just installed psad and am testing it. This morning I awoke to an email saying:
[-] You may just need to add a default logging rule to the /sbin/ip6tables
''filter'' ''INPUT'' chain on hydra. For more information,
see the file "FW_HELP" in the psad sources directory or visit:
http://www.cipherdyne.org/psad/docs/fwconfig.html
Well I have
2007 Feb 19
0
Quick demo guide for SPA ( re: the port knocking thread )
For what it's worth to those who want to play with SPA, here
is a demo i whipped up. It is very easy to set up, and i
almost guarantee anyone can get this running.
What we will demonstrate:
Bascially: An SPA demo.
Requirements: Very little - a minimal setup of centos.
This setup will demonstrate a client who initially cannot
connect to a an ssh port on the server (the server is
DROPing
2016 Aug 03
2
Configure option '--with-ssh1' breaks openssh-7.3p1
OK, with this additional information I can now reproduce it.
Based on some quick experiments it seems to be triggered when sshd is
built --with-ssh1 and the config does not *load* a Protocol 1 host
key.
Works:
Protocol=1,2 + Hostkey not specified
Protocol=1,2 + Hostkeys for both protocols specified.
Doesn't work:
Protocol=2 + Hostkey not specified.
Protocol=1,2 + Hostkeys specified only for
2020 Feb 17
3
sshd crashes
Hi,
sshd crashes at below location.
After compilation, when I start sshd it crashes in ?sshbuf-misc.c? file
inside ?sshbuf_b64tod? function at line size_t plen = strlen(b64);
The call trace is as below,
Sshd main function -> sshkey_load_public -> sshkey_try_load_public ->
sshkey_read -> sshbuf_b64tod
During compilation a warning is thrown. Is this the trigger point for the
crash?