Fix an input validation error that can result in an integer overflow and privilege escalation. Apply by doing: cd /usr/src patch -p0 < 006_sshpreauth.patch cd usr.bin/ssh make obj make cleandir make depend make && make install Index: auth2-chall.c =================================================================== RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v retrieving revision 1.18 diff -u -r1.18 auth2-chall.c --- usr.bin/ssh/auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18 +++ usr.bin/ssh/auth2-chall.c 26 Jun 2002 09:37:03 -0000 @@ -256,6 +256,8 @@ authctxt->postponed = 0; /* reset */ nresp = packet_get_int(); + if (nresp > 100) + fatal("input_userauth_info_response: nresp too big %u", nresp); if (nresp > 0) { response = xmalloc(nresp * sizeof(char*)); for (i = 0; i < nresp; i++)