Commit Graph

  • 5cd7942801 Fix an invalid strlen comparison in ssh_message_auth_reply_default Andrew Collins 2012-12-18 14:45:42 -07:00
  • de9bc1fa41 string: Fix memory leak in ssh_string_to_char(). Andreas Schneider 2012-12-13 19:29:46 +01:00
  • b14df297fa BUG 97: Fix strtoull() detection on serveral platforms. Andreas Schneider 2012-12-03 14:00:06 +01:00
  • 3896aa43ff BUG 96: Guard ntohll() and htonll prototypes correctly. Andreas Schneider 2012-12-03 13:31:28 +01:00
  • da8d44ccba BUG 98: Use __attribute__ ((packed)) only with GCC. Andreas Schneider 2012-12-03 13:19:29 +01:00
  • c6fc69fbdd BUG 97: Remove obsolete hsterror(). Andreas Schneider 2012-12-03 13:08:17 +01:00
  • ab8c7de6f8 BUG 94: Fix big endian issue. Andreas Schneider 2012-12-03 12:35:36 +01:00
  • cd4e28e7c8 test: Try to fetch wrong values in buffer. Aris Adamantiadis 2012-10-22 20:45:59 +02:00
  • ea0e858de0 priv: Add BURN_BUFFER macro and make sure it isn't optimzed out. Andreas Schneider 2012-11-23 11:56:21 +01:00
  • e403596d98 pki: Add a size limit for pubkey files. Andreas Schneider 2012-11-21 12:44:00 +01:00
  • 6da817aa47 Update ChangeLog. libssh-0.5.3 Andreas Schneider 2012-11-14 10:04:40 +01:00
  • 571dc42335 CVE-2012-4559: Make sure we don't free name and longname twice on error. Andreas Schneider 2012-10-05 14:46:36 +02:00
  • 68d04c8e47 CVE-2012-4559: Ensure that we don't free req twice. Andreas Schneider 2012-10-05 14:38:29 +02:00
  • bd3acae4f3 CVE-2012-4560: Fix a write one past the end of 'buf'. Andreas Schneider 2012-10-05 11:39:47 +02:00
  • 894bbf3137 CVE-2012-4560: Fix a write one past the end of the 'u' buffer. Andreas Schneider 2012-10-05 11:37:09 +02:00
  • f61813eaea CVE-2012-4562: Fix a possible infinite loop in buffer_reinit(). Andreas Schneider 2012-10-12 11:35:20 +02:00
  • ad5f306884 CVE-2012-4562: Fix multiple integer overflows in buffer-related functions. Xi Wang 2011-11-28 04:42:54 -05:00
  • 5ffb8c7cde CVE-2012-4562: Fix possible integer overflows. Xi Wang 2011-11-25 23:02:57 -05:00
  • efaebad323 CVE-2012-4562: Fix possible integer overflow in ssh_get_hexa(). Xi Wang 2011-11-25 23:02:06 -05:00
  • 05ed61848f cmake: Bump version number. Andreas Schneider 2012-11-14 10:04:23 +01:00
  • d63f19c300 CVE-2012-4561: Fix possible free's on invalid pointers. Andreas Schneider 2012-10-05 15:07:17 +02:00
  • 455da60846 CVE-2012-4561: Fix error handling of try_publickey_from_file(). Andreas Schneider 2012-10-05 14:56:56 +02:00
  • 46b2eb3c14 CVE-2012-4559: Make sure we don't free name and longname twice on error. Andreas Schneider 2012-10-05 14:46:36 +02:00
  • 6236001ff4 CVE-2012-4559: Ensure that we don't free req twice. Andreas Schneider 2012-10-05 14:39:51 +02:00
  • 1471f2c67a CVE-2012-4559: Ensure we don't free blob or request twice. Andreas Schneider 2012-10-05 14:33:29 +02:00
  • b485463197 CVE-2012-4560: Fix a write one past the end of 'buf'. Andreas Schneider 2012-10-05 11:39:47 +02:00
  • 64fca8a7ed CVE-2012-4560: Fix a write one past the end of the 'u' buffer. Andreas Schneider 2012-10-05 11:37:09 +02:00
  • e3d9501b31 CVE-2012-4562: Fix possible string related integer overflows. Xi Wang 2011-11-25 23:02:57 -05:00
  • 1699adfa03 CVE-2012-4562: Fix a possible infinite loop in buffer_reinit(). Andreas Schneider 2012-10-12 11:35:20 +02:00
  • db81310d71 CVE-2012-4562: Fix multiple integer overflows in buffer-related functions. Xi Wang 2011-11-28 04:42:54 -05:00
  • 8489521c0d CVE-2012-4562: Fix possible integer overflow in ssh_get_hexa(). Xi Wang 2011-11-25 23:02:06 -05:00
  • cab00c3bfc pki: Fix integer overflow in ssh_pki_import_privkey_file(). Xi Wang 2011-11-25 23:01:18 -05:00
  • d404ad7152 channels: Fix integer overflow in generate_cookie(). Xi Wang 2011-11-25 23:00:13 -05:00
  • 2ee6282fdd channels: Fix a possible infinite loop if the connection dropped. Andreas Schneider 2012-10-22 18:13:53 +02:00
  • ae218d0d15 channels1: Add missing request_state and set it to accepted. Andreas Schneider 2012-10-22 18:05:06 +02:00
  • 26579b2231 auth1: Reset error state to no error. Andreas Schneider 2012-10-22 18:01:39 +02:00
  • a4ffaff550 channels1: Add missing request_state and set it to accepted. Andreas Schneider 2012-10-22 18:05:06 +02:00
  • e164b236c6 auth1: Reset error state to no error. Andreas Schneider 2012-10-22 18:01:39 +02:00
  • 04f1d950b9 session: Fix a possible use after free in ssh_free(). Andreas Schneider 2012-10-22 16:22:09 +02:00
  • 166ccef8dc session: Fix a possible use after free in ssh_free(). Andreas Schneider 2012-10-22 16:32:08 +02:00
  • f2e498c7db cmake: Set GNU compiler flags also for clang. Andreas Schneider 2012-10-22 16:05:39 +02:00
  • dde0404dfb cmake: Add message if we build with static library. Andreas Schneider 2012-10-15 11:55:42 +02:00
  • 191c0ae2bb doc: Update copyright policy. Andreas Schneider 2012-10-12 18:16:16 +02:00
  • f86b2bf743 doc: Update copyright policy. Andreas Schneider 2012-10-12 18:16:16 +02:00
  • 13c26f0733 options: Fix documentation of ssh_options_get_port(). Andreas Schneider 2012-10-14 19:53:51 +02:00
  • f5d8bdf946 doc: Update doxygen config. Andreas Schneider 2012-10-14 19:52:28 +02:00
  • f4f2237263 doc: Use the correct channel functions. Andreas Schneider 2012-10-14 19:44:02 +02:00
  • 7e93edc722 cmake: Add better check to detect -fvisibility=hidden. Andreas Schneider 2012-10-14 18:39:30 +02:00
  • 95ab34696b kex: Use getter functions to access kex arrays. Andreas Schneider 2012-10-12 17:43:32 +02:00
  • 82711acd39 cmake: Fix building with gcrypt support. Andreas Schneider 2012-10-12 17:07:00 +02:00
  • e8118c5be4 tests: Add a valgrind suppression for getaddrino leak. Andreas Schneider 2012-10-09 11:19:31 +02:00
  • a59a379ce4 tests: Add a valgrind suppression for OPENSSL_cleanse(). Andreas Schneider 2012-10-09 09:27:37 +02:00
  • 0bd2bbefa7 scp: Make sure buffer is initialzed. Andreas Schneider 2012-10-08 22:51:35 +02:00
  • 3d390cf6ff pki: Make sure the key_buf is null terminated. Andreas Schneider 2012-10-08 22:46:56 +02:00
  • e04dc45f20 misc: Use a fixed buffer for getenv(). Andreas Schneider 2012-10-08 22:38:20 +02:00
  • de34a64895 poll: Fix sizeof in ssh_poll_ctx_resize(). Andreas Schneider 2012-10-08 22:13:28 +02:00
  • 46f22576b0 legacy: Use snprintf instead of sprintf. Andreas Schneider 2012-10-08 22:12:40 +02:00
  • 2f8ddc6e65 dh: Don't use strcat for ssh_get_hexa(). Andreas Schneider 2012-10-08 22:08:14 +02:00
  • b1287cd946 server: Use strncat instead of strcat. Andreas Schneider 2012-10-08 21:50:08 +02:00
  • a660177a6e misc: Use strncpy instead of strcat. Andreas Schneider 2012-10-08 21:42:17 +02:00
  • 0a4ea19982 pki: Fix a possible null pointer dereference. Andreas Schneider 2012-10-08 21:37:42 +02:00
  • 0bf2dd81e6 messages: Fix memory leaks in user request callback. Andreas Schneider 2012-10-08 21:36:05 +02:00
  • ecb6cfd053 connect: Don't leak the addressinfo on error. Andreas Schneider 2012-10-09 11:27:24 +02:00
  • ba220adb84 connect: Don't leak the file descriptor on error. Andreas Schneider 2012-10-08 21:19:34 +02:00
  • 802e4133cb session: Don't leak memory in ssh_send_debug(). Andreas Schneider 2012-10-08 21:16:56 +02:00
  • dde3deb9ea channels: Don't leak memory in channel_rcv_request callback. Andreas Schneider 2012-10-08 21:15:23 +02:00
  • 66045054f4 auth: Don't leak memory on error in info request callback. Andreas Schneider 2012-10-08 21:10:06 +02:00
  • 96e0301b58 dh: Don't leak 'f' on error. Andreas Schneider 2012-10-08 21:08:04 +02:00
  • 029d165b61 legacy: Don't leak the key struct on error. Andreas Schneider 2012-10-08 21:05:53 +02:00
  • 4e7736444f server: Don't leak memory on calling ssh_string_from_char(). Andreas Schneider 2012-10-08 20:39:56 +02:00
  • 7254390ac2 pki: Don't leak the signature on error paths. Andreas Schneider 2012-10-08 20:53:45 +02:00
  • 188c596803 sftp: Don't leak owner and group in sftp_parse_attr_4. Andreas Schneider 2012-10-08 20:57:49 +02:00
  • 0295301928 known_hosts: Don't leak memory in ssh_write_knownhost error paths. Andreas Schneider 2012-10-08 20:52:30 +02:00
  • a6e7d1f255 agent: Fix some memory leaks in error paths. Andreas Schneider 2012-10-08 20:46:35 +02:00
  • f2c183b413 include: Fix an include recursion. Andreas Schneider 2012-10-08 20:45:08 +02:00
  • 5e8e21d106 options: Check return code of ssh_iterator_value. Andreas Schneider 2012-10-08 20:43:03 +02:00
  • bcc00eec9b kex: Don't compare an array to null. Andreas Schneider 2012-10-08 20:34:19 +02:00
  • 53008fb5d4 string: Don't compare an array to null. Andreas Schneider 2012-10-08 20:30:08 +02:00
  • 9338fb8e5e message: Set correct request type. Andreas Schneider 2012-10-08 20:26:29 +02:00
  • ec5b4d377f sftpserver: Add missing break statement. Andreas Schneider 2012-10-08 20:24:43 +02:00
  • 6352b3d93a server: Fix for loop to free server methods. Andreas Schneider 2012-10-08 20:20:02 +02:00
  • b8de9e75d0 client: If session is NULL we can't set an error. Andreas Schneider 2012-10-08 20:14:31 +02:00
  • ec56d1d453 match: Don't dereference 's' directly. Andreas Schneider 2012-10-08 20:11:40 +02:00
  • 87036839f9 example: Simplify auth_callback of the client. Andreas Schneider 2012-10-08 20:07:09 +02:00
  • 131a0de32e auth: Make error handling code reachable again. Andreas Schneider 2012-10-08 20:01:19 +02:00
  • 3e93836e8b pki: Make error handling code reachable again. Andreas Schneider 2012-10-08 19:58:52 +02:00
  • 21db70888a socket: Check return value of buffer function. Andreas Schneider 2012-10-08 19:56:46 +02:00
  • bb2848de5a channels: Check return values of buffer functions. Andreas Schneider 2012-10-08 19:52:20 +02:00
  • 6acce40a28 scp: Check return value of ssh_channel_poll. Andreas Schneider 2012-10-08 19:47:46 +02:00
  • 41269874f5 packet: Check return values of buffer functions. Andreas Schneider 2012-10-08 19:43:55 +02:00
  • 9abe591843 client: Check return value of ssh_handle_packets_termination. Andreas Schneider 2012-10-08 19:39:21 +02:00
  • 114cc51a10 pcap: Check return codes of buffer_add_* functions. Andreas Schneider 2012-10-08 19:36:45 +02:00
  • 9fe47da903 torture: Fix keyboard interactive authentication. Andreas Schneider 2012-10-09 10:11:55 +02:00
  • 362be13156 tests: Make sure the array is null terminated. Andreas Schneider 2012-10-07 23:23:33 +02:00
  • e17fcd70f9 torture: Use new userauth functions. Andreas Schneider 2012-10-07 23:21:17 +02:00
  • 5f0f334d1c pki: Don't leak memory in pubkey to blob. Andreas Schneider 2012-10-07 22:36:06 +02:00
  • 996b7cae26 pki: Make sure we don't double free pointers. Andreas Schneider 2012-10-07 22:35:33 +02:00
  • b219d1890c tests: Don't leak memory in options test. Andreas Schneider 2012-10-07 22:15:20 +02:00
  • bfa568e448 pki: Check for no memory available calling ssh_key_new(). Andreas Schneider 2012-10-07 22:04:58 +02:00
  • ff53664f54 sftp: Fix a possible null pointer dereference in sftp_async_read. Andreas Schneider 2012-10-07 22:03:35 +02:00