Bug 25722

Summary: OpenSSH on 4.2 dumps core from illegal user
Product: Base System Reporter: seraf <seraf>
Component: binAssignee: Brian Feldman <green>
Status: Closed FIXED    
Severity: Affects Only Me    
Priority: Normal    
Version: Unspecified   
Hardware: Any   
OS: Any   
Attachments:
Description Flags
file.diff none

Description seraf 2001-03-12 06:10:01 UTC
sshd in SSH-2 mode dumps core to the tune of signal 11 when an illegal username is attempted by the client. This has been tested with OpenSSH and lsh clients. The last log message entered is "input_userauth_request: illegal user [username]".

Fix: Dirty patch with strange coincidence of dates:
How-To-Repeat: ssh -2 aleistercrowley666@localhost
Comment 1 Kris Kennaway freebsd_committer freebsd_triage 2001-03-12 06:27:47 UTC
Responsible Changed
From-To: freebsd-bugs->green

Brian is the SSH maintainer
Comment 2 avn 2001-06-14 19:25:48 UTC
This PR can be closed.
(fixed in auth2.c 1.2.2.6)
Comment 3 Peter Pentchev freebsd_committer freebsd_triage 2001-06-15 19:15:17 UTC
State Changed
From-To: open->closed

Fixed quite some time ago.