Package: openssh
Version: 1:4.2p1-2
Severity: important
Tags: patch
Our automated buildd log filter[1] detected a problem that will cause
your package to segfault on architectures where the size of a pointer is
greater than the size of an integer, such as ia64.
[1]http://people.debian.org/~dannf/check-implicit-pointer-functions
diff -urN openssh-4.2p1.orig/ssh-gss.h openssh-4.2p1/ssh-gss.h
--- openssh-4.2p1.orig/ssh-gss.h 2005-09-14 15:47:51.000000000 -0600
+++ openssh-4.2p1/ssh-gss.h 2005-09-14 15:56:04.000000000 -0600
@@ -135,6 +135,7 @@
int ssh_gssapi_check_mechanism(gss_OID, void *);
gss_OID ssh_gssapi_id_kex(Gssctxt *, char *);
+char *ssh_gssapi_server_mechanisms();
int ssh_gssapi_server_check_mech(gss_OID, void *);
int ssh_gssapi_userok(char *name);
OM_uint32 ssh_gssapi_checkmic(Gssctxt *, gss_buffer_t, gss_buffer_t);
--- Begin Message ---
Function `ssh_gssapi_server_mechanisms' implicitly converted to pointer at
../sshd.c:2032
--- End Message ---