summaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* CVE-2013-0176: Fix a remote DoS if the client doesn't send a matching kex.Andreas Schneider2013-01-141-2/+11
| | | | Thanks to Yong Chuan Koh, X-Force Research <kohyc@sg.ibm.com>
* options: Fix a free crash bug if we parse unknown options.Andreas Schneider2013-01-111-6/+8
| | | | Thanks to Yong Chuan Koh, X-Force Research <kohyc@sg.ibm.com>
* channels1: Fix severa possible null pointer dereferences.Andreas Schneider2013-01-101-6/+59
| | | | (cherry picked from commit b811b89f57ec167612948e688d75015f85b9c8f4)
* CVE-2012-4561: Fix possible free's on invalid pointers.Andreas Schneider2012-11-141-0/+5
|
* CVE-2012-4561: Fix error handling of try_publickey_from_file().Andreas Schneider2012-11-141-6/+6
|
* CVE-2012-4559: Make sure we don't free name and longname twice on error.Andreas Schneider2012-11-141-10/+16
|
* CVE-2012-4559: Ensure that we don't free req twice.Andreas Schneider2012-11-141-1/+1
|
* CVE-2012-4559: Ensure we don't free blob or request twice.Andreas Schneider2012-11-141-0/+2
|
* CVE-2012-4560: Fix a write one past the end of 'buf'.Andreas Schneider2012-11-141-2/+3
|
* CVE-2012-4560: Fix a write one past the end of the 'u' buffer.Andreas Schneider2012-11-141-1/+1
|
* CVE-2012-4562: Fix possible string related integer overflows.Xi Wang2012-11-141-7/+18
|
* CVE-2012-4562: Fix a possible infinite loop in buffer_reinit().Andreas Schneider2012-11-141-4/+9
| | | | | If needed is bigger than the highest power of two or a which fits in an integer we will loop forever.
* CVE-2012-4562: Fix multiple integer overflows in buffer-related functions.Xi Wang2012-11-141-5/+15
|
* CVE-2012-4562: Fix possible integer overflow in ssh_get_hexa().Xi Wang2012-11-141-0/+4
| | | | No exploit known, but it is better to check the string length.
* channels: Fix a possible infinite loop if the connection dropped.Andreas Schneider2012-10-221-1/+3
| | | | This fixes bug #85.
* channels1: Add missing request_state and set it to accepted.Andreas Schneider2012-10-221-0/+1
| | | | This fixes bug #88.
* auth1: Reset error state to no error.Andreas Schneider2012-10-221-0/+1
| | | | This fixes bug #89.
* session: Fix a possible use after free in ssh_free().Andreas Schneider2012-10-221-15/+19
| | | | | | | We need to cleanup the channels first cause we call ssh_channel_close() on the channels which still require a working socket and poll context. Thanks to sh4rm4!
* channel: Fix a possible null pointer dereference.Andreas Schneider2012-10-051-1/+6
| | | | (cherry picked from commit ceb8072b34a581eb72ed43f7f7ce78fd9b0ea708)
* channels: Fix a possible null pointer dereference.Andreas Schneider2012-10-051-1/+6
| | | | (cherry picked from commit 656fd60110b73b3fc56c8c407b12a68be7ca67ff)
* getpass: Fix a memory leak in ssh_gets() on error.Andreas Schneider2012-10-051-0/+1
| | | | (cherry picked from commit 6092596199e8ebfbbf6e6ba48b7ec6ca0d85fa13)
* sftp: Harden sftp_extension_supported() against null pointers.Andreas Schneider2012-10-051-2/+10
| | | | (cherry picked from commit 22f607649d7dc530df84b7b90781ce0b88153095)
* sftp: Fix a memory on error in sftp_opendir().Andreas Schneider2012-10-051-0/+1
| | | | (cherry picked from commit b5c4b090da254c1ad3689983b0cb999b09aa3394)
* misc: Don't leak memory on ssh_path_expand_escape() on error.Andreas Schneider2012-10-051-0/+4
| | | | (cherry picked from commit 61d032fc03e0055c859931f466bc75fbdf36385a)
* session: Fix a memory leak in ssh_new() on error.Andreas Schneider2012-10-051-0/+1
| | | | (cherry picked from commit 280ce3fe937c96899732814928c8ecfa9f9ae431)
* Fix regression in pre-connected socket setting.Werner Koch2012-09-212-8/+21
| | | | | | | | | | | * src/socket.c (ssh_socket_pollcallback): Factor some code out to ... (ssh_socket_set_connecting): New. * include/libssh/socket.h (ssh_socket_set_connecting): Add prototype. * src/client.c (ssh_connect): Use new function for a socket set by SSH_OPTIONS_FD. Signed-off-by: Werner Koch <wk@gnupg.org> Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
* build: Fix missing struct in_addr warning.Andreas Schneider2012-07-1713-0/+13
| | | | (cherry picked from commit 782b2e37c6a4e0254e2b596b9182043c5ebabd75)
* sftp: Fix bug in sftp_mkdir not returning on error.Andreas Schneider2012-07-171-0/+1
| | | | | resolves: #84 (cherry picked from commit a92c97b2e17715c1b3cdd693d14af6c3311d8e44)
* connect: Fix a build warning.Andreas Schneider2012-07-171-1/+1
| | | | (cherry picked from commit 8b8d9dc83af81dfaec22bbb6710083e79f00c470)
* session: Cleanup timeout functions and fix packets termination.rofl0r2012-01-022-34/+41
| | | | | | | | It is possible that we get unrelated packets while waiting for termination, thus waiting indefinitely. As a workaround we have to check the user-supplied timeout. Also cleaned up ssh_blocking_flush, which was using the timeout in a bogus manner (resetting the timeout after each check).
* message: Fix compiler warning.Andreas Schneider2012-01-021-1/+1
| | | | (cherry picked from commit 2f861a858be9f2fe1f55a0fbfc47d732e3b3b31b)
* message: Handle all unknown global messages.rofl0r2012-01-011-1/+4
| | | | | Reply to unknown global messages as required by the RFC. Therefore keepalive@openssh.com style messages should get treated in a sane way.
* keyfiles: Fix build errors with callbacks.Andreas Schneider2011-09-171-5/+5
| | | | Introduced with the last commit.
* Fixes the ssh_log issue on ssh_bind handles.Aris Adamantiadis2011-09-1710-51/+78
| | | | | | | | (cherry picked from commit da954c2c5ee85bcbe2f5ad9f507a6306b0f5f8b9) Conflicts: src/keyfiles.c
* SSH1: handle exit-status message (channels would not close)Aris Adamantiadis2011-09-152-1/+14
|
* channels: don't send SSH2 packets on SSH1 !Aris Adamantiadis2011-09-151-0/+7
|
* SSH1: fix buildAris Adamantiadis2011-09-022-11/+14
| | | | | | | | | (cherry picked from commit 3eece8ac0b107a7df8d95325ef17ed19d6429e75) Conflicts: src/channels.c src/channels1.c
* channels: replaced bugged lists with ssh_listAris Adamantiadis2011-09-025-46/+58
| | | | | | | | | (cherry picked from commit 6d8bb956c5caa48c2aba6713f067224650c3c1e1) Conflicts: src/channels.c src/session.c
* poll: resolve use-after-free + inconsistent callbacks callAris Adamantiadis2011-09-021-18/+3
| | | | | | | This code was weird in the first place. I suspect my change will break something else (probably the appcode that needed it). ssh_poll_ctx_free is not a good place to send exception callbacks imho. (cherry picked from commit b5351f2809140921076ef54cc6092b543b5199d2)
* Channels: increase window size x10Aris Adamantiadis2011-09-021-1/+1
| | | | | | Provides me a 3x performance boost for async sftp, 5x for sync sftp (on localhost) (cherry picked from commit 17ae216340fea65edbfbb59789121e6e4af73f20)
* channels: Fix bug #52.Andreas Schneider2011-09-021-4/+15
| | | | | | | (cherry picked from commit a2c94abb92ead1503a0d6284609af41e53bef402) Conflicts: src/channels.c
* scp: Fixed documentation bug #9Aris Adamantiadis2011-09-021-2/+6
| | | | (cherry picked from commit 99e6fde751365f0f3508ce9e1899d28ca4c3edb3)
* channels: Fix possible infinite loop in channel_read().rofl0r2011-08-291-1/+5
| | | | (cherry picked from commit 66188f1af84852b9d9fc09acf26454c4cfacefef)
* sftp: Handle short reads of sftp_async_read().Jonas Jonsson2011-08-291-3/+2
| | | | | | | | | sftp_async_read() and sftp_async_read_begin() assume that the whole read will be successful but when this is not the case, the offset will be wrong. Signed-off-by: Andreas Schneider <asn@cryptomilk.org> (cherry picked from commit d1df255df46b0b59ce5abfa1b2a4b971ebb4fb64)
* auth: Handle request service timeout in blocking mode.Andreas Schneider2011-08-271-2/+7
| | | | (cherry picked from commit e5e673bafe18032df3b6b7634410a6795e809f2a)
* auth: Fix ssh_auth_list() documentation.Andreas Schneider2011-08-221-1/+1
| | | | | The server will not return SSH_AUTH_METHOD_NONE. (cherry picked from commit 9c376dd913b40bbcf9e0fc528f53e02c104b6c58)
* channels: Fix incorrect return values in ssh_channel_write().Andreas Schneider2011-08-101-3/+12
| | | | (cherry picked from commit 13227714f25b57b95594f33d395bc3cea0b7fe8e)
* session: Fix an infinite loop in the termination callback.rofl0r2011-08-101-17/+11
| | | | | | This happened due to the use of the buggy and obsolete timeout funtions. (cherry picked from commit 7949f2cdc6eb1ac0f076e06e6a3fa47540a9b870)
* channels: Handle SSH_AGAIN in channel_open().Andreas Schneider2011-08-092-12/+9
| | | | (cherry picked from commit 2f878736427f5fd846f8ebb0c834e6a65bf8a638)
* Fix "status -5 inflating zlib packet"Mark Riordan2011-08-091-1/+1
| | | | | | Signed-off-by: Mark Riordan <mriordan@ipswitch.com> Signed-off-by: Andreas Schneider <asn@cryptomilk.org> (cherry picked from commit 6c45d6dc0196a2846313b588c0e05996813ab3f8)