Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | BUG 103: Fix ProxyCommand parsing. | Andreas Schneider | 2013-06-02 | 1 | -2/+21 |
| | |||||
* | config: Rename ssh_config_get_str(). | Andreas Schneider | 2013-06-02 | 1 | -11/+11 |
| | |||||
* | opts: Fix segfault in option parser. | Andreas Schneider | 2013-06-02 | 1 | -3/+11 |
| | |||||
* | getpass: Don't fail if stdin is not a tty. | Andreas Schneider | 2013-04-05 | 1 | -23/+27 |
| | | | | | We don't need to manipulate the tty state (such as turning off echo) when prompting for passwords if we're not reading from a tty. | ||||
* | poll: return error on poll() when pollset is empty | Aris Adamantiadis | 2013-02-26 | 1 | -1/+1 |
| | |||||
* | socket: Call data handler as long as handler takes data. | Johannes Krude | 2013-01-29 | 1 | -4/+6 |
| | | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | ||||
* | include: Fix the LGPL header. | Andreas Schneider | 2013-01-23 | 1 | -13/+12 |
| | | | | | This has been reported by rpmlint: libssh-devel.x86_64: W: incorrect-fsf-address libssh.h | ||||
* | options: Fix a free crash bug if we parse unknown options. | Andreas Schneider | 2013-01-22 | 1 | -6/+8 |
| | | | | Thanks to Yong Chuan Koh, X-Force Research <kohyc@sg.ibm.com> | ||||
* | Report according status when errors are detected | Aris Adamantiadis | 2012-12-27 | 1 | -3/+18 |
| | |||||
* | Fix channel_write to wait during key reexchanges | Aris Adamantiadis | 2012-12-23 | 1 | -1/+20 |
| | |||||
* | Implement key re-exchange | Aris Adamantiadis | 2012-12-23 | 6 | -14/+44 |
| | |||||
* | Fix an invalid strlen comparison in ssh_message_auth_reply_default | Andrew Collins | 2012-12-19 | 1 | -1/+1 |
| | | | | | | | | | During the transition to strncat in ssh_message_auth_reply_default, an invalid strlen comparison was added which causes the function to fail whenever it's called. Signed-off-by: Andrew Collins <bsderandrew@gmail.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | ||||
* | string: Fix memory leak in ssh_string_to_char(). | Andreas Schneider | 2012-12-13 | 1 | -6/+6 |
| | | | | This was probably a mistake by me fixing up a patch after merging. | ||||
* | BUG 97: Remove obsolete hsterror(). | Andreas Schneider | 2012-12-03 | 1 | -12/+1 |
| | | | | | | This function is pretty much obsolete on most platforms. The standard errno should be used. If it is not enough on Windows we should use WSAGetLastError() in future. | ||||
* | BUG 94: Fix big endian issue. | Andreas Schneider | 2012-12-03 | 1 | -3/+5 |
| | |||||
* | pki: Add a size limit for pubkey files. | Andreas Schneider | 2012-11-21 | 1 | -1/+1 |
| | |||||
* | CVE-2012-4559: Make sure we don't free name and longname twice on error. | Andreas Schneider | 2012-11-14 | 1 | -10/+16 |
| | |||||
* | CVE-2012-4559: Ensure that we don't free req twice. | Andreas Schneider | 2012-11-14 | 1 | -1/+1 |
| | |||||
* | CVE-2012-4560: Fix a write one past the end of 'buf'. | Andreas Schneider | 2012-11-14 | 1 | -2/+3 |
| | |||||
* | CVE-2012-4560: Fix a write one past the end of the 'u' buffer. | Andreas Schneider | 2012-11-14 | 1 | -1/+1 |
| | |||||
* | CVE-2012-4562: Fix a possible infinite loop in buffer_reinit(). | Andreas Schneider | 2012-11-14 | 1 | -4/+9 |
| | | | | | If needed is bigger than the highest power of two or a which fits in an integer we will loop forever. | ||||
* | CVE-2012-4562: Fix multiple integer overflows in buffer-related functions. | Xi Wang | 2012-11-14 | 1 | -5/+21 |
| | |||||
* | CVE-2012-4562: Fix possible integer overflows. | Xi Wang | 2012-11-14 | 1 | -2/+14 |
| | |||||
* | CVE-2012-4562: Fix possible integer overflow in ssh_get_hexa(). | Xi Wang | 2012-11-14 | 1 | -0/+5 |
| | | | | No exploit known, but it is better to check the string length. | ||||
* | pki: Fix integer overflow in ssh_pki_import_privkey_file(). | Xi Wang | 2012-10-22 | 1 | -0/+5 |
| | | | | | If the file size is ULONG_MAX, the call to malloc() may allocate a small buffer, leading to a memory corruption. | ||||
* | channels: Fix integer overflow in generate_cookie(). | Xi Wang | 2012-10-22 | 1 | -1/+1 |
| | | | | | | Since the type of rnd[i] is signed char, (rnd[i] >> 4), which is considered as arithmetic shift by gcc, could be negative, leading to out-of-bounds read. | ||||
* | channels1: Add missing request_state and set it to accepted. | Andreas Schneider | 2012-10-22 | 1 | -0/+1 |
| | | | | This fixes bug #88. | ||||
* | auth1: Reset error state to no error. | Andreas Schneider | 2012-10-22 | 1 | -0/+1 |
| | | | | This fixes bug #89. | ||||
* | session: Fix a possible use after free in ssh_free(). | Andreas Schneider | 2012-10-22 | 1 | -33/+54 |
| | | | | | | | We need to cleanup the channels first cause we call ssh_channel_close() on the channels which still require a working socket and poll context. Thanks to sh4rm4! | ||||
* | options: Fix documentation of ssh_options_get_port(). | Andreas Schneider | 2012-10-14 | 1 | -1/+1 |
| | |||||
* | kex: Use getter functions to access kex arrays. | Andreas Schneider | 2012-10-12 | 3 | -7/+23 |
| | | | | This should fix the build on OpenIndiana. | ||||
* | scp: Make sure buffer is initialzed. | Andreas Schneider | 2012-10-12 | 1 | -1/+1 |
| | | | | Found by Coverity. | ||||
* | pki: Make sure the key_buf is null terminated. | Andreas Schneider | 2012-10-12 | 1 | -0/+1 |
| | | | | Found by Coverity. | ||||
* | misc: Use a fixed buffer for getenv(). | Andreas Schneider | 2012-10-12 | 1 | -2/+8 |
| | |||||
* | poll: Fix sizeof in ssh_poll_ctx_resize(). | Andreas Schneider | 2012-10-12 | 1 | -2/+2 |
| | | | | | | | sizeof(ssh_poll_handle *) is to be equal to sizeof(ssh_poll_handle), but this is not a portable assumption. Found by Coverity. | ||||
* | legacy: Use snprintf instead of sprintf. | Andreas Schneider | 2012-10-12 | 1 | -2/+3 |
| | | | | Found by Coverity. | ||||
* | dh: Don't use strcat for ssh_get_hexa(). | Andreas Schneider | 2012-10-12 | 1 | -9/+8 |
| | | | | | | This is just hardening the code. Found by Coverity. | ||||
* | server: Use strncat instead of strcat. | Andreas Schneider | 2012-10-12 | 1 | -4/+12 |
| | | | | | | This is just hardening the code. Found by Coverity. | ||||
* | misc: Use strncpy instead of strcat. | Andreas Schneider | 2012-10-12 | 1 | -1/+1 |
| | | | | | | This is just hardening the code. Found by Coverity. | ||||
* | pki: Fix a possible null pointer dereference. | Andreas Schneider | 2012-10-12 | 1 | -3/+3 |
| | | | | Found by Coverity. | ||||
* | messages: Fix memory leaks in user request callback. | Andreas Schneider | 2012-10-12 | 1 | -54/+41 |
| | |||||
* | connect: Don't leak the addressinfo on error. | Andreas Schneider | 2012-10-12 | 1 | -0/+1 |
| | |||||
* | connect: Don't leak the file descriptor on error. | Andreas Schneider | 2012-10-12 | 1 | -0/+1 |
| | | | | Found by Coverity. | ||||
* | session: Don't leak memory in ssh_send_debug(). | Andreas Schneider | 2012-10-12 | 1 | -4/+4 |
| | | | | Found by Coverity. | ||||
* | channels: Don't leak memory in channel_rcv_request callback. | Andreas Schneider | 2012-10-12 | 1 | -0/+1 |
| | | | | Found by Coverity. | ||||
* | auth: Don't leak memory on error in info request callback. | Andreas Schneider | 2012-10-12 | 1 | -3/+5 |
| | | | | Found by Coverity. | ||||
* | dh: Don't leak 'f' on error. | Andreas Schneider | 2012-10-12 | 1 | -5/+6 |
| | | | | Found by Coverity. | ||||
* | legacy: Don't leak the key struct on error. | Andreas Schneider | 2012-10-12 | 1 | -0/+1 |
| | | | | Found by Coverity. | ||||
* | server: Don't leak memory on calling ssh_string_from_char(). | Andreas Schneider | 2012-10-12 | 1 | -8/+32 |
| | | | | | | Also check the return values. Found by Coverity. | ||||
* | pki: Don't leak the signature on error paths. | Andreas Schneider | 2012-10-12 | 1 | -0/+2 |
| | | | | Found by Coverity. |