Andreas Schneider
8a4364a99b
ecdh: Avoid memory leaks in ssh_server_ecdh_init().
2013-06-19 11:19:08 +02:00
Andreas Schneider
6dae8baefc
src: Add fall trough comments.
2013-06-18 17:17:23 +02:00
Andreas Schneider
94a8c30feb
pki: Fix switch statement of pki_key_generate_ecdsa().
2013-06-18 17:16:59 +02:00
Andreas Schneider
1deb3412bb
connect: Use the correct close function.
2013-06-18 17:06:58 +02:00
Andreas Schneider
aaae3c4ec1
connect: Correctly fail in ssh_connect_host_nonblocking().
2013-06-18 17:05:57 +02:00
Andreas Schneider
b31efd9ff1
ecdh: Make sure we don't leak memory in ssh_client_ecdh_init().
...
This also adds more checks for return values.
2013-06-18 17:02:40 +02:00
Andreas Schneider
5d05aec2ef
auth: Cleanup the agent return code.
2013-06-18 16:42:33 +02:00
Nicolas Viennot
6306bee86c
auth: If the agent fails, fall back to regular path
...
It's causing issues on MacOSX when ssh_agent_get_ident_count()
reports "Agent count: 0".
2013-06-18 16:39:31 +02:00
Andreas Schneider
7ceaea479e
kex1: Fix null check of hostkey.
2013-06-17 13:21:51 +02:00
Andreas Schneider
2b68728552
socket: Check if socket (non)blocking is working.
2013-06-17 13:18:55 +02:00
Andreas Schneider
42c7bc5a21
socket: Check return value of getsockopt().
2013-06-17 13:09:50 +02:00
Andreas Schneider
ee47cab548
packet: Fix a possible segfault.
2013-06-17 13:04:27 +02:00
Andreas Schneider
a65029da5d
messages: Fix a possible segfault.
2013-06-17 13:02:49 +02:00
Andreas Schneider
f31c33bb31
ecdh: Check return values of buffer_add_* functions.
2013-06-17 12:59:22 +02:00
Andreas Schneider
4255a7223c
dh: Check return value of buffer_add_ssh_string().
2013-06-17 12:53:26 +02:00
Andreas Schneider
9ee45a18d7
connect: Check return value of getsockopt().
2013-06-17 12:47:21 +02:00
Andreas Schneider
0ba075e9ce
channels1: Check return value of buffer_add_u8().
2013-06-17 12:40:35 +02:00
Andreas Schneider
e4bcd063b7
packet1: Don't free an invalid address.
2013-06-17 12:10:55 +02:00
Andreas Schneider
d83b3d9ebe
pki: Limit privkey to 4M for now.
2013-06-17 12:07:32 +02:00
Andreas Schneider
6f8b5ed679
pki: Fix a resource leak on error.
2013-06-17 11:49:13 +02:00
Andreas Schneider
33e95792ce
pki: Fix resource leak on error.
2013-06-13 15:46:53 +02:00
Andreas Schneider
1a894e2cf2
client: Fix possible NULL pointer dereference.
2013-06-13 11:46:17 +02:00
Andreas Schneider
b8a3e5ffe3
known_hosts: Fix readablity.
2013-06-13 11:08:37 +02:00
Andreas Schneider
09663692dd
pki: Use fstat() after opening the file.
2013-06-13 11:04:59 +02:00
Andreas Schneider
abd6b8004e
kex: Fix a double free.
2013-06-13 10:51:12 +02:00
Andreas Schneider
e3c5096fcf
server: Fix a double free.
2013-06-13 10:48:50 +02:00
Andreas Schneider
fcf8af20f8
BUG 103: Fix ProxyCommand parsing.
2013-06-02 19:29:28 +02:00
Andreas Schneider
2d28ee7d22
config: Rename ssh_config_get_str().
2013-06-02 18:54:16 +02:00
Andreas Schneider
e41482fec4
opts: Fix segfault in option parser.
2013-06-02 18:34:39 +02:00
Andreas Schneider
992f00b145
getpass: Don't fail if stdin is not a tty.
...
We don't need to manipulate the tty state (such as turning off echo)
when prompting for passwords if we're not reading from a tty.
2013-04-05 14:14:22 +02:00
Aris Adamantiadis
222a0d78ca
poll: return error on poll() when pollset is empty
2013-02-26 23:52:25 +01:00
Johannes Krude
186116f34a
socket: Call data handler as long as handler takes data.
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-01-29 10:56:49 +01:00
Andreas Schneider
b2f52799c2
include: Fix the LGPL header.
...
This has been reported by rpmlint:
libssh-devel.x86_64: W: incorrect-fsf-address libssh.h
2013-01-23 00:22:46 +01:00
Andreas Schneider
21a45e89c5
options: Fix a free crash bug if we parse unknown options.
...
Thanks to Yong Chuan Koh, X-Force Research <kohyc@sg.ibm.com>
2013-01-22 11:32:47 +01:00
Aris Adamantiadis
de096910b3
Report according status when errors are detected
2012-12-27 22:01:37 +01:00
Aris Adamantiadis
6d61c3ce4a
Fix channel_write to wait during key reexchanges
2012-12-23 23:10:29 +01:00
Aris Adamantiadis
63c3f0e736
Implement key re-exchange
2012-12-23 23:09:50 +01:00
Andrew Collins
5cd7942801
Fix an invalid strlen comparison in ssh_message_auth_reply_default
...
During the transition to strncat in ssh_message_auth_reply_default,
an invalid strlen comparison was added which causes the function
to fail whenever it's called.
Signed-off-by: Andrew Collins <bsderandrew@gmail.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2012-12-19 16:03:49 +01:00
Andreas Schneider
de9bc1fa41
string: Fix memory leak in ssh_string_to_char().
...
This was probably a mistake by me fixing up a patch after merging.
2012-12-13 19:29:46 +01:00
Andreas Schneider
c6fc69fbdd
BUG 97: Remove obsolete hsterror().
...
This function is pretty much obsolete on most platforms. The standard
errno should be used. If it is not enough on Windows we should use
WSAGetLastError() in future.
2012-12-03 13:08:17 +01:00
Andreas Schneider
ab8c7de6f8
BUG 94: Fix big endian issue.
2012-12-03 12:35:36 +01:00
Andreas Schneider
e403596d98
pki: Add a size limit for pubkey files.
2012-11-21 12:44:00 +01:00
Andreas Schneider
571dc42335
CVE-2012-4559: Make sure we don't free name and longname twice on error.
2012-11-14 17:36:24 +01:00
Andreas Schneider
68d04c8e47
CVE-2012-4559: Ensure that we don't free req twice.
2012-11-14 17:36:24 +01:00
Andreas Schneider
bd3acae4f3
CVE-2012-4560: Fix a write one past the end of 'buf'.
2012-11-14 17:36:24 +01:00
Andreas Schneider
894bbf3137
CVE-2012-4560: Fix a write one past the end of the 'u' buffer.
2012-11-14 17:36:24 +01:00
Andreas Schneider
f61813eaea
CVE-2012-4562: Fix a possible infinite loop in buffer_reinit().
...
If needed is bigger than the highest power of two or a which fits in an
integer we will loop forever.
2012-11-14 17:36:22 +01:00
Xi Wang
ad5f306884
CVE-2012-4562: Fix multiple integer overflows in buffer-related functions.
2012-11-14 17:36:19 +01:00
Xi Wang
5ffb8c7cde
CVE-2012-4562: Fix possible integer overflows.
2012-11-14 17:36:16 +01:00
Xi Wang
efaebad323
CVE-2012-4562: Fix possible integer overflow in ssh_get_hexa().
...
No exploit known, but it is better to check the string length.
2012-11-14 17:36:11 +01:00