Bug#801530: openssh-client: Segfault on malformed keys - possible security impact

2015-10-13 Thread Steve Kemp
The following patch seems to me to be a reasonable stab at fixing the NULL pointer dereference. Tested on Debian Jessie (amd64), against keys of type: * dsa * ecdsa * ed25519 * rsa * rsa1 On a valid key it shows the fingerprint. On my bogus sample it shows: line 2

Bug#801530: openssh-client: Segfault on malformed keys - possible security impact)

2015-10-12 Thread Steve Kemp
> .. and the exciting-looking address is apparently a typical load address > for the ssh binary. Yes. It was in the ascii-range, which made me more optimistic. (I'm too used to using AAA..AAA as input and seeing 0x41. 0x55 looks close enough to be plausible.) Steve --

Bug#801530: openssh-client: Segfault on malformed keys - possible security impact

2015-10-12 Thread Steve Kemp
I'm almost embarrassed to say that I submitted the wrong reproducer in my original bug report. The previous key does trigger the fault, but it is needlessly complex. The attachment to this mail should be considered a saner example, as it still triggers the crash, but it is is significantly

Bug#801530: openssh-client: Segfault on malformed keys - possible security impact

2015-10-11 Thread Steve Kemp
Package: openssh-client Version: 1:6.7p1-5 Severity: important Tags: security Dear Maintainer, I believe that the sanest way to generate an SSH fingerprint, for display to users, etc, is via executing: ssh-keygen -l -f path/to/public.key This is the rationale behind the following blog-post: