aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2013-07-26Update ChangeLog.libssh-0.5.5Andreas Schneider1-0/+7
2013-07-26BUG 103: Disable proxy command if set to 'none'.Andreas Schneider2-4/+26
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
2013-07-26client: Fix possible NULL pointer dereference.Andreas Schneider1-2/+2
2013-07-26kex: Fix a double free.Andreas Schneider1-0/+1
2013-07-26Check for NULL pointers in channels.cmilo1-5/+37
2013-07-26cmake: Set application version as package version.Andreas Schneider1-3/+3
2013-06-02BUG 103: Fix ProxyCommand parsing.Andreas Schneider1-2/+21
2013-06-02config: Rename ssh_config_get_str().Andreas Schneider1-11/+11
2013-06-02opts: Fix segfault in option parser.Andreas Schneider1-3/+11
2013-06-02cmake: Fix setting -D_FORTIFY_SOURCE=2.Andreas Schneider1-4/+9
2013-02-27poll: return error on poll() when pollset is emptyAris Adamantiadis1-1/+1
(cherry picked from commit 222a0d78ca5c272ea109e847d62cf12674dd875f)
2013-02-12Update version number to 0.5.5.Andreas Schneider2-3/+3
2013-02-05server: Fix typo in dh_handshake_server().Laurent Bigonville1-1/+1
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-01-22Update to version 0.5.4.libssh-0.5.4Andreas Schneider3-3/+8
2013-01-14CVE-2013-0176: Fix a remote DoS if the client doesn't send a matching kex.Andreas Schneider1-2/+11
Thanks to Yong Chuan Koh, X-Force Research <kohyc@sg.ibm.com>
2013-01-11options: Fix a free crash bug if we parse unknown options.Andreas Schneider1-6/+8
Thanks to Yong Chuan Koh, X-Force Research <kohyc@sg.ibm.com>
2013-01-10channels1: Fix severa possible null pointer dereferences.Andreas Schneider1-6/+59
(cherry picked from commit b811b89f57ec167612948e688d75015f85b9c8f4)
2012-11-14Update ChangeLog.libssh-0.5.3Andreas Schneider1-0/+15
2012-11-14cmake: Bump version number.Andreas Schneider2-3/+3
2012-11-14CVE-2012-4561: Fix possible free's on invalid pointers.Andreas Schneider1-0/+5
2012-11-14CVE-2012-4561: Fix error handling of try_publickey_from_file().Andreas Schneider1-6/+6
2012-11-14CVE-2012-4559: Make sure we don't free name and longname twice on error.Andreas Schneider1-10/+16
2012-11-14CVE-2012-4559: Ensure that we don't free req twice.Andreas Schneider1-1/+1
2012-11-14CVE-2012-4559: Ensure we don't free blob or request twice.Andreas Schneider1-0/+2
2012-11-14CVE-2012-4560: Fix a write one past the end of 'buf'.Andreas Schneider1-2/+3
2012-11-14CVE-2012-4560: Fix a write one past the end of the 'u' buffer.Andreas Schneider1-1/+1
2012-11-14CVE-2012-4562: Fix possible string related integer overflows.Xi Wang1-7/+18
2012-11-14CVE-2012-4562: Fix a possible infinite loop in buffer_reinit().Andreas Schneider1-4/+9
If needed is bigger than the highest power of two or a which fits in an integer we will loop forever.
2012-11-14CVE-2012-4562: Fix multiple integer overflows in buffer-related functions.Xi Wang1-5/+15
2012-11-14CVE-2012-4562: Fix possible integer overflow in ssh_get_hexa().Xi Wang1-0/+4
No exploit known, but it is better to check the string length.
2012-10-22channels: Fix a possible infinite loop if the connection dropped.Andreas Schneider1-1/+3
This fixes bug #85.
2012-10-22channels1: Add missing request_state and set it to accepted.Andreas Schneider1-0/+1
This fixes bug #88.
2012-10-22auth1: Reset error state to no error.Andreas Schneider1-0/+1
This fixes bug #89.
2012-10-22session: Fix a possible use after free in ssh_free().Andreas Schneider1-15/+19
We need to cleanup the channels first cause we call ssh_channel_close() on the channels which still require a working socket and poll context. Thanks to sh4rm4!
2012-10-14doc: Update copyright policy.Andreas Schneider2-28/+198
2012-10-05channel: Fix a possible null pointer dereference.Andreas Schneider1-1/+6
(cherry picked from commit ceb8072b34a581eb72ed43f7f7ce78fd9b0ea708)
2012-10-05channels: Fix a possible null pointer dereference.Andreas Schneider1-1/+6
(cherry picked from commit 656fd60110b73b3fc56c8c407b12a68be7ca67ff)
2012-10-05getpass: Fix a memory leak in ssh_gets() on error.Andreas Schneider1-0/+1
(cherry picked from commit 6092596199e8ebfbbf6e6ba48b7ec6ca0d85fa13)
2012-10-05sftp: Harden sftp_extension_supported() against null pointers.Andreas Schneider1-2/+10
(cherry picked from commit 22f607649d7dc530df84b7b90781ce0b88153095)
2012-10-05sftp: Fix a memory on error in sftp_opendir().Andreas Schneider1-0/+1
(cherry picked from commit b5c4b090da254c1ad3689983b0cb999b09aa3394)
2012-10-05misc: Don't leak memory on ssh_path_expand_escape() on error.Andreas Schneider1-0/+4
(cherry picked from commit 61d032fc03e0055c859931f466bc75fbdf36385a)
2012-10-05session: Fix a memory leak in ssh_new() on error.Andreas Schneider1-0/+1
(cherry picked from commit 280ce3fe937c96899732814928c8ecfa9f9ae431)
2012-09-21Fix regression in pre-connected socket setting.Werner Koch3-8/+22
* src/socket.c (ssh_socket_pollcallback): Factor some code out to ... (ssh_socket_set_connecting): New. * include/libssh/socket.h (ssh_socket_set_connecting): Add prototype. * src/client.c (ssh_connect): Use new function for a socket set by SSH_OPTIONS_FD. Signed-off-by: Werner Koch <wk@gnupg.org> Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
2012-07-17build: Fix missing struct in_addr warning.Andreas Schneider13-0/+13
(cherry picked from commit 782b2e37c6a4e0254e2b596b9182043c5ebabd75)
2012-07-17sftp: Fix bug in sftp_mkdir not returning on error.Andreas Schneider1-0/+1
resolves: #84 (cherry picked from commit a92c97b2e17715c1b3cdd693d14af6c3311d8e44)
2012-07-17connect: Fix a build warning.Andreas Schneider1-1/+1
(cherry picked from commit 8b8d9dc83af81dfaec22bbb6710083e79f00c470)
2012-01-02session: Cleanup timeout functions and fix packets termination.rofl0r3-34/+42
It is possible that we get unrelated packets while waiting for termination, thus waiting indefinitely. As a workaround we have to check the user-supplied timeout. Also cleaned up ssh_blocking_flush, which was using the timeout in a bogus manner (resetting the timeout after each check).
2012-01-02message: Fix compiler warning.Andreas Schneider1-1/+1
(cherry picked from commit 2f861a858be9f2fe1f55a0fbfc47d732e3b3b31b)
2012-01-01message: Handle all unknown global messages.rofl0r1-1/+4
Reply to unknown global messages as required by the RFC. Therefore keepalive@openssh.com style messages should get treated in a sane way.
2011-09-17keyfiles: Fix build errors with callbacks.Andreas Schneider1-5/+5
Introduced with the last commit.