| Summary: | GSSAPI client code permits SPNEGO usage | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Simon Wilkinson <simon> | ||||||
| Component: | Kerberos support | Assignee: | Assigned to nobody <unassigned-bugs> | ||||||
| Status: | CLOSED FIXED | ||||||||
| Severity: | normal | ||||||||
| Priority: | P2 | ||||||||
| Version: | 4.3p2 | ||||||||
| Hardware: | Other | ||||||||
| OS: | All | ||||||||
| Bug Depends on: | |||||||||
| Bug Blocks: | 1155 | ||||||||
| Attachments: |
|
||||||||
|
Description
Simon Wilkinson
2006-08-18 00:51:26 AEST
Created attachment 1174 [details]
Fix to prevent OpenSSH offering SPENGO to a server
Patch against latest portable CVS.
fix applied - thanks Sorry for the trouble. I've just realised I've got the return code in the SPNEGO case. Instead of returning (-1) - TRUE, we should return 0 - FALSE. The -1 was left from a previous version that returned error codes, rather than a true/false value. Trivial patch is about to be attached. Sorry once again! Simon. Created attachment 1175 [details]
Fix to incorrect return code in patch
applied - thanks With the release of 4.4, we believe that this bug is now closed. For information about the release please see http://www.openssh.com/txt/release-4.4 . |