Date: Sun, 11 Jun 2000 10:17:41 +0200 From: Udo Schweigert <ust@cert.siemens.de> To: Kris Kennaway <kris@FreeBSD.ORG> Cc: cvs-committers@FreeBSD.ORG, cvs-all@FreeBSD.ORG Subject: Re: cvs commit: src/crypto/openssh session.c Message-ID: <20000611101741.A23252@alaska.cert.siemens.de> In-Reply-To: <200006102238.AAA09849@internat.freebsd.org>; from kris@FreeBSD.ORG on Sun, Jun 11, 2000 at 12:38:13AM %2B0200 References: <200006102238.AAA09849@internat.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Jun 11, 2000 at 00:38:13 +0200, Kris Kennaway wrote: > kris 2000/06/11 00:38:13 SAST > > FreeBSD International Crypto Repository > > Modified files: (Branch: RELENG_4) > crypto/openssh session.c > Log: > MFC: Security botch > > Revision Changes Path > 1.4.2.2 +5 -1 src/crypto/openssh/session.c > This broke sshd. A patch like the one attached fixed it for me. Regards -- Udo Schweigert, Siemens AG | Voice : +49 89 636 42170 ZT IK 3, Siemens CERT | Fax : +49 89 636 41166 D-81730 Muenchen / Germany | email : ust@cert.siemens.de PGP-2/5 fingerprint | D8 A5 DF 34 EC 87 E8 C6 E2 26 C4 D0 EE 80 36 B2 --- session.c.orig Sun Jun 11 09:14:28 2000 +++ session.c Sun Jun 11 10:11:47 2000 @@ -858,13 +858,15 @@ struct stat st; char *argv[10]; +#ifdef LOGIN_CAP + login_cap_t *lc; +#endif /* LOGIN_CAP */ + /* login(1) is only called if we execute the login shell */ if (options.use_login && command != NULL) options.use_login = 0; #ifdef LOGIN_CAP - login_cap_t *lc; - lc = login_getpwclass(pw); if (lc == NULL) lc = login_getclassbyname(NULL, pw); To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000611101741.A23252>