Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/netbsd-1-5]: src/crypto/dist/ssh Apply patch (requested by he):
details: https://anonhg.NetBSD.org/src/rev/e74ac3cd6e03
branches: netbsd-1-5
changeset: 493168:e74ac3cd6e03
user: he <he%NetBSD.org@localhost>
date: Wed Jun 26 19:30:59 2002 +0000
description:
Apply patch (requested by he):
Pull in a point patch for the preauth security vulnerability,
taken from http://www.openssh.com/txt/preauth.adv.
diffstat:
crypto/dist/ssh/auth2-chall.c | 4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diffs (18 lines):
diff -r d0963112682d -r e74ac3cd6e03 crypto/dist/ssh/auth2-chall.c
--- a/crypto/dist/ssh/auth2-chall.c Wed Jun 26 17:44:52 2002 +0000
+++ b/crypto/dist/ssh/auth2-chall.c Wed Jun 26 19:30:59 2002 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: auth2-chall.c,v 1.1.1.1.2.3 2001/12/10 23:52:45 he Exp $ */
+/* $NetBSD: auth2-chall.c,v 1.1.1.1.2.4 2002/06/26 19:30:59 he Exp $ */
/*
* Copyright (c) 2001 Markus Friedl. All rights reserved.
* Copyright (c) 2001 Per Allansson. All rights reserved.
@@ -244,6 +244,8 @@
authctxt->postponed = 0; /* reset */
nresp = packet_get_int();
+ if (nresp > 100)
+ fatal("input_userauth_info_response: nresp too big %u", nresp);
if (nresp > 0) {
response = xmalloc(nresp * sizeof(char*));
for (i = 0; i < nresp; i++)
Home |
Main Index |
Thread Index |
Old Index