summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2008-11-03 19:22:09 +1100
committerDamien Miller <djm@mindrot.org>2008-11-03 19:22:09 +1100
commitc4d1b36cc2fb89566fe01b990abf8b635e0dce74 (patch)
treef0c9f2c8c52ec453241aa2f34ceb937566f2b620
parent49b78d4fbc138a252fc083c67d6b3750477d92a1 (diff)
aadt@cvs.openbsd.org 2008/10/03 23:56:28
[sshconnect2.c] Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the function. spotted by des@freebsd, who commited an incorrect fix to the freebsd tree and (as is fairly typical) did not report the problem to us. But this fix is correct. ok djm
-rw-r--r--ChangeLog10
-rw-r--r--sshconnect2.c6
2 files changed, 12 insertions, 4 deletions
diff --git a/ChangeLog b/ChangeLog
index 5da1ee43..81c6ef9b 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -39,6 +39,14 @@
do not give an example of how to chmod files: we can presume the user
knows that. removes an ambiguity in the permission of authorized_keys;
ok deraadt
+ - deraadt@cvs.openbsd.org 2008/10/03 23:56:28
+ [sshconnect2.c]
+ Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the
+ function.
+ spotted by des@freebsd, who commited an incorrect fix to the freebsd tree
+ and (as is fairly typical) did not report the problem to us. But this fix
+ is correct.
+ ok djm
20080906
- (dtucker) [config.guess config.sub] Update to latest versions from
@@ -4773,4 +4781,4 @@
OpenServer 6 and add osr5bigcrypt support so when someone migrates
passwords between UnixWare and OpenServer they will still work. OK dtucker@
-$Id: ChangeLog,v 1.5108 2008/11/03 08:21:21 djm Exp $
+$Id: ChangeLog,v 1.5109 2008/11/03 08:22:09 djm Exp $
diff --git a/sshconnect2.c b/sshconnect2.c
index 1a8f3907..fe9285f1 100644
--- a/sshconnect2.c
+++ b/sshconnect2.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: sshconnect2.c,v 1.167 2008/07/31 14:48:28 markus Exp $ */
+/* $OpenBSD: sshconnect2.c,v 1.168 2008/10/03 23:56:28 deraadt Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
*
@@ -386,8 +386,8 @@ input_userauth_banner(int type, u_int32_t seq, void *ctxt)
if (len > 0 && options.log_level >= SYSLOG_LEVEL_INFO) {
if (len > 65536)
len = 65536;
- msg = xmalloc(len * 4); /* max expansion from strnvis() */
- strnvis(msg, raw, len * 4, VIS_SAFE|VIS_OCTAL);
+ msg = xmalloc(len * 4 + 1); /* max expansion from strnvis() */
+ strnvis(msg, raw, len * 4 + 1, VIS_SAFE|VIS_OCTAL);
fprintf(stderr, "%s", msg);
xfree(msg);
}