aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2014-03-04security: fix for vulnerability CVE-2014-0017v0-5Aris Adamantiadis4-1/+15
When accepting a new connection, a forking server based on libssh forks and the child process handles the request. The RAND_bytes() function of openssl doesn't reset its state after the fork, but simply adds the current process id (getpid) to the PRNG state, which is not guaranteed to be unique. This can cause several children to end up with same PRNG state which is a security issue. Conflicts: src/bind.c
2013-10-23tests: Add a sftp_read blocking test.Andreas Schneider2-0/+83
2013-10-06socket: Call data handler as long as handler takes data.Johannes Krude1-4/+6
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-07-26Update ChangeLog.libssh-0.5.5Andreas Schneider1-0/+7
2013-07-26BUG 103: Disable proxy command if set to 'none'.Andreas Schneider2-4/+26
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
2013-07-26client: Fix possible NULL pointer dereference.Andreas Schneider1-2/+2
2013-07-26kex: Fix a double free.Andreas Schneider1-0/+1
2013-07-26Check for NULL pointers in channels.cmilo1-5/+37
2013-07-26cmake: Set application version as package version.Andreas Schneider1-3/+3
2013-06-02BUG 103: Fix ProxyCommand parsing.Andreas Schneider1-2/+21
2013-06-02config: Rename ssh_config_get_str().Andreas Schneider1-11/+11
2013-06-02opts: Fix segfault in option parser.Andreas Schneider1-3/+11
2013-06-02cmake: Fix setting -D_FORTIFY_SOURCE=2.Andreas Schneider1-4/+9
2013-02-27poll: return error on poll() when pollset is emptyAris Adamantiadis1-1/+1
(cherry picked from commit 222a0d78ca5c272ea109e847d62cf12674dd875f)
2013-02-12Update version number to 0.5.5.Andreas Schneider2-3/+3
2013-02-05server: Fix typo in dh_handshake_server().Laurent Bigonville1-1/+1
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-01-22Update to version 0.5.4.libssh-0.5.4Andreas Schneider3-3/+8
2013-01-14CVE-2013-0176: Fix a remote DoS if the client doesn't send a matching kex.Andreas Schneider1-2/+11
Thanks to Yong Chuan Koh, X-Force Research <kohyc@sg.ibm.com>
2013-01-11options: Fix a free crash bug if we parse unknown options.Andreas Schneider1-6/+8
Thanks to Yong Chuan Koh, X-Force Research <kohyc@sg.ibm.com>
2013-01-10channels1: Fix severa possible null pointer dereferences.Andreas Schneider1-6/+59
(cherry picked from commit b811b89f57ec167612948e688d75015f85b9c8f4)
2012-11-14Update ChangeLog.libssh-0.5.3Andreas Schneider1-0/+15
2012-11-14cmake: Bump version number.Andreas Schneider2-3/+3
2012-11-14CVE-2012-4561: Fix possible free's on invalid pointers.Andreas Schneider1-0/+5
2012-11-14CVE-2012-4561: Fix error handling of try_publickey_from_file().Andreas Schneider1-6/+6
2012-11-14CVE-2012-4559: Make sure we don't free name and longname twice on error.Andreas Schneider1-10/+16
2012-11-14CVE-2012-4559: Ensure that we don't free req twice.Andreas Schneider1-1/+1
2012-11-14CVE-2012-4559: Ensure we don't free blob or request twice.Andreas Schneider1-0/+2
2012-11-14CVE-2012-4560: Fix a write one past the end of 'buf'.Andreas Schneider1-2/+3
2012-11-14CVE-2012-4560: Fix a write one past the end of the 'u' buffer.Andreas Schneider1-1/+1
2012-11-14CVE-2012-4562: Fix possible string related integer overflows.Xi Wang1-7/+18
2012-11-14CVE-2012-4562: Fix a possible infinite loop in buffer_reinit().Andreas Schneider1-4/+9
If needed is bigger than the highest power of two or a which fits in an integer we will loop forever.
2012-11-14CVE-2012-4562: Fix multiple integer overflows in buffer-related functions.Xi Wang1-5/+15
2012-11-14CVE-2012-4562: Fix possible integer overflow in ssh_get_hexa().Xi Wang1-0/+4
No exploit known, but it is better to check the string length.
2012-10-22channels: Fix a possible infinite loop if the connection dropped.Andreas Schneider1-1/+3
This fixes bug #85.
2012-10-22channels1: Add missing request_state and set it to accepted.Andreas Schneider1-0/+1
This fixes bug #88.
2012-10-22auth1: Reset error state to no error.Andreas Schneider1-0/+1
This fixes bug #89.
2012-10-22session: Fix a possible use after free in ssh_free().Andreas Schneider1-15/+19
We need to cleanup the channels first cause we call ssh_channel_close() on the channels which still require a working socket and poll context. Thanks to sh4rm4!
2012-10-14doc: Update copyright policy.Andreas Schneider2-28/+198
2012-10-05channel: Fix a possible null pointer dereference.Andreas Schneider1-1/+6
(cherry picked from commit ceb8072b34a581eb72ed43f7f7ce78fd9b0ea708)
2012-10-05channels: Fix a possible null pointer dereference.Andreas Schneider1-1/+6
(cherry picked from commit 656fd60110b73b3fc56c8c407b12a68be7ca67ff)
2012-10-05getpass: Fix a memory leak in ssh_gets() on error.Andreas Schneider1-0/+1
(cherry picked from commit 6092596199e8ebfbbf6e6ba48b7ec6ca0d85fa13)
2012-10-05sftp: Harden sftp_extension_supported() against null pointers.Andreas Schneider1-2/+10
(cherry picked from commit 22f607649d7dc530df84b7b90781ce0b88153095)
2012-10-05sftp: Fix a memory on error in sftp_opendir().Andreas Schneider1-0/+1
(cherry picked from commit b5c4b090da254c1ad3689983b0cb999b09aa3394)
2012-10-05misc: Don't leak memory on ssh_path_expand_escape() on error.Andreas Schneider1-0/+4
(cherry picked from commit 61d032fc03e0055c859931f466bc75fbdf36385a)
2012-10-05session: Fix a memory leak in ssh_new() on error.Andreas Schneider1-0/+1
(cherry picked from commit 280ce3fe937c96899732814928c8ecfa9f9ae431)
2012-09-21Fix regression in pre-connected socket setting.Werner Koch3-8/+22
* src/socket.c (ssh_socket_pollcallback): Factor some code out to ... (ssh_socket_set_connecting): New. * include/libssh/socket.h (ssh_socket_set_connecting): Add prototype. * src/client.c (ssh_connect): Use new function for a socket set by SSH_OPTIONS_FD. Signed-off-by: Werner Koch <wk@gnupg.org> Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
2012-07-17build: Fix missing struct in_addr warning.Andreas Schneider13-0/+13
(cherry picked from commit 782b2e37c6a4e0254e2b596b9182043c5ebabd75)
2012-07-17sftp: Fix bug in sftp_mkdir not returning on error.Andreas Schneider1-0/+1
resolves: #84 (cherry picked from commit a92c97b2e17715c1b3cdd693d14af6c3311d8e44)
2012-07-17connect: Fix a build warning.Andreas Schneider1-1/+1
(cherry picked from commit 8b8d9dc83af81dfaec22bbb6710083e79f00c470)
2012-01-02session: Cleanup timeout functions and fix packets termination.rofl0r3-34/+42
It is possible that we get unrelated packets while waiting for termination, thus waiting indefinitely. As a workaround we have to check the user-supplied timeout. Also cleaned up ssh_blocking_flush, which was using the timeout in a bogus manner (resetting the timeout after each check).