Bugzilla – Attachment 659 Details for
Bug 884
DSA keys (id_dsa.pub) with 8192 bits or more aren't correctly recognized
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
discard excessively long lines in key_try_load_public
openssh-truncate-key_load.patch (text/plain), 903 bytes, created by
Darren Tucker
on 2004-06-24 15:30:39 AEST
(
hide
)
Description:
discard excessively long lines in key_try_load_public
Filename:
MIME Type:
Creator:
Darren Tucker
Created:
2004-06-24 15:30:39 AEST
Size:
903 bytes
patch
obsolete
>Index: authfile.c >=================================================================== >RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/authfile.c,v >retrieving revision 1.56 >diff -u -p -r1.56 authfile.c >--- authfile.c 22 Jun 2004 02:56:02 -0000 1.56 >+++ authfile.c 24 Jun 2004 05:23:55 -0000 >@@ -598,12 +598,22 @@ static int > key_try_load_public(Key *k, const char *filename, char **commentp) > { > FILE *f; >- char line[4096]; >+ char line[8192]; > char *cp; >+ int c, lineno = 0; > > f = fopen(filename, "r"); > if (f != NULL) { > while (fgets(line, sizeof(line), f)) { >+ lineno++; >+ if (line[strlen(line) - 1] != '\n') { >+ error("Excessively long line in %s line %d", >+ filename, lineno); >+ /* discard remainder of line */ >+ while ((c = fgetc(f) != EOF) && c != '\n') >+ ; /* nothing */ >+ break; >+ } > line[sizeof(line)-1] = '\0'; > cp = line; > switch (*cp) {
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 884
:
658
|
659
|
660
|
661
|
663
|
733
|
734
|
735