fix bug which allowed for unencrypted sessions - markus@
This commit is contained in:
parent
78edeef281
commit
a94b6ef6a9
14
security/ssh/patches/patch-aj
Normal file
14
security/ssh/patches/patch-aj
Normal file
@ -0,0 +1,14 @@
|
||||
--- sshd.c.orig Mon Dec 13 20:27:21 1999
|
||||
+++ sshd.c Mon Dec 13 20:28:45 1999
|
||||
@@ -1496,8 +1496,10 @@
|
||||
/* Read clients reply (cipher type and session key). */
|
||||
packet_read_expect(SSH_CMSG_SESSION_KEY);
|
||||
|
||||
- /* Get cipher type. */
|
||||
+ /* Get cipher type and check whether we accept this. */
|
||||
cipher_type = packet_get_char();
|
||||
+ if (!(cipher_mask() & (1 << cipher_type)))
|
||||
+ packet_disconnect("Warning: client selects unsupported cipher.");
|
||||
|
||||
/* Get check bytes from the packet. These must match those we sent earlier
|
||||
with the public key packet. */
|
@ -1,5 +1,6 @@
|
||||
|
||||
ssh-1.2.27: patch-ai fixes the buffer overflow in RSAREF rsaglue code.
|
||||
patch-ai fixes the buffer overflow in RSAREF rsaglue code.
|
||||
patch-aj fixes a bug which allowed for unencrypted sessions.
|
||||
|
||||
OpenSSH (integrated into OpenBSD-2.6) does not have this bug.
|
||||
OpenSSH (integrated since OpenBSD 2.6) does not have these bugs.
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user