* Fix deadlock when AuthorizedKeysCommand produces a large output.
(LP: #1877454)
- d/p/authkeyscommand-deadlock-01.patch: Make sure to call fclose(2)
and assign NULL to the file handler used to read
"Authorized{Keys,Principal}Command" directives.
- d/p/authkeyscommand-deadlock-02.patch: Consume entire output
generated by the command pointed by
"Authorized{Keys,Principal}Command" in order to avoid sending a
SIGPIPE to the process.
This bug was fixed in the package openssh - 1:7.2p2-4ubuntu2.10
--------------- 4ubuntu2. 10) xenial; urgency=medium
openssh (1:7.2p2-
* Fix deadlock when AuthorizedKeysC ommand produces a large output. mand-deadlock- 01.patch: Make sure to call fclose(2) Authorized{ Keys,Principal} Command" directives. mand-deadlock- 02.patch: Consume entire output Authorized{ Keys,Principal} Command" in order to avoid sending a
(LP: #1877454)
- d/p/authkeyscom
and assign NULL to the file handler used to read
"
- d/p/authkeyscom
generated by the command pointed by
"
SIGPIPE to the process.
openssh (1:7.2p2- 4ubuntu2. 9) xenial; urgency=medium
* Apply upstream patch to stop using 2020 as a future date in regress
tests. LP: #1859013
-- Sergio Durigan Junior <email address hidden> Wed, 13 May 2020 10:12:28 -0400