Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 11 Jun 2000 10:17:41 +0200
From:      Udo Schweigert <ust@cert.siemens.de>
To:        Kris Kennaway <kris@FreeBSD.ORG>
Cc:        cvs-committers@FreeBSD.ORG, cvs-all@FreeBSD.ORG
Subject:   Re: cvs commit: src/crypto/openssh session.c
Message-ID:  <20000611101741.A23252@alaska.cert.siemens.de>
In-Reply-To: <200006102238.AAA09849@internat.freebsd.org>; from kris@FreeBSD.ORG on Sun, Jun 11, 2000 at 12:38:13AM %2B0200
References:  <200006102238.AAA09849@internat.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Jun 11, 2000 at 00:38:13 +0200, Kris Kennaway wrote:
> kris        2000/06/11 00:38:13 SAST
> 
> FreeBSD International Crypto Repository
> 
>   Modified files:        (Branch: RELENG_4)
>     crypto/openssh       session.c 
>   Log:
>   MFC: Security botch
>   
>   Revision  Changes    Path
>   1.4.2.2   +5 -1      src/crypto/openssh/session.c
> 

This broke sshd. A patch like the one attached fixed it for me.

Regards

-- 
Udo Schweigert, Siemens AG   | Voice      : +49 89 636 42170
ZT IK 3, Siemens CERT        | Fax        : +49 89 636 41166
D-81730 Muenchen / Germany   | email      : ust@cert.siemens.de
PGP-2/5 fingerprint          | D8 A5 DF 34 EC 87 E8 C6  E2 26 C4 D0 EE 80 36 B2

--- session.c.orig	Sun Jun 11 09:14:28 2000
+++ session.c	Sun Jun 11 10:11:47 2000
@@ -858,13 +858,15 @@
 	struct stat st;
 	char *argv[10];
 
+#ifdef LOGIN_CAP
+	login_cap_t *lc;
+#endif /* LOGIN_CAP */
+
 	/* login(1) is only called if we execute the login shell */
 	if (options.use_login && command != NULL)
 		options.use_login = 0;
 
 #ifdef LOGIN_CAP
-	login_cap_t *lc;
-
 	lc = login_getpwclass(pw);
 	if (lc == NULL)
 		lc = login_getclassbyname(NULL, pw);


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000611101741.A23252>