From owner-freebsd-ports Wed Jan 22 12:22:30 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id MAA24780 for ports-outgoing; Wed, 22 Jan 1997 12:22:30 -0800 (PST) Received: from muuri.ssh.fi (ssh.fi [194.100.44.97]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id MAA24762; Wed, 22 Jan 1997 12:21:24 -0800 (PST) Received: from pilari.ssh.fi (pilari.ssh.fi [192.168.2.1]) by muuri.ssh.fi (8.8.5/8.8.5/EPIPE-1.10) with ESMTP id WAA25856; Wed, 22 Jan 1997 22:19:56 +0200 (EET) Received: from pilari.ssh.fi (pilari.ssh.fi [192.168.2.1]) by pilari.ssh.fi (8.8.5/8.8.5/1.9) with SMTP id WAA00219; Wed, 22 Jan 1997 22:19:46 +0200 (EET) Date: Wed, 22 Jan 1997 22:19:46 +0200 (EET) From: Tomi Salo To: David Nugent cc: ssh-bugs@cs.hut.fi, torstenb@freebsd.org, freebsd-ports@freebsd.org Subject: Re: Bug in sshd 2.1.17 In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-ports@freebsd.org X-Loop: FreeBSD.org Precedence: bulk On Wed, 22 Jan 1997, David Nugent wrote: > There is a bug present in sshd from the ssh 2.1.17 package in > which under some circumstances will cause a pointer to be > freed twice. The bug appears to be triggered as a result of > calling auth_delete_socket() twice after a disconnect where > (X?) authentication forwarding is in effect. Thanks for noticing this. The bug has now been fixed. -- Tomi T. Salo SSH Communications Security Oy