sshkey_fingerprint failed AddressSanitizer:DEADLYSIGNAL ================================================================= ==407==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f7 ff58a4266 bp 0x7f7fffffd6b0 sp 0x7f7fffffd420 T0) ==407==The signal is caused by a READ memory access. ==407==Hint: address points to the zero page. #0 0x7f7ff58a4265 in ssh_packet_connection_is_on_socket (/usr/lib/libssh.so. 32+0xa4265) #1 0x2cbd9f in pfilter_notify (/usr/sbin/sshd+0xcbd9f) #2 0x26e8cf in cleanup_exit (/usr/sbin/sshd+0x6e8cf) #3 0x7f7ff592de5e in ssh_fatal (/usr/lib/libssh.so.32+0x12de5e) #4 0x26d567 in main (/usr/sbin/sshd+0x6d567) #5 0x265f21 in ___start (/usr/sbin/sshd+0x65f21) #6 0x7f7ff7ef8fff () AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/usr/lib/libssh.so.32+0xa4265) in ssh_packet_co nnection_is_on_socket ==407==ABORTING /etc/rc.d/sshd exited with code 1 --------------------- AddressSanitizer:DEADLYSIGNAL ================================================================= ==19930==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f7ff58a3f96 bp 0x7f7fffffd550 sp 0x7f7fffffd2c0 T0) ==19930==The signal is caused by a READ memory access. ==19930==Hint: address points to the zero page. #0 0x7f7ff58a3f95 in ssh_packet_connection_is_on_socket /public/src.git/crypto/external/bsd/openssh/dist/packet.c:420:37 #1 0x2cbd6f in pfilter_notify /public/src.git/crypto/external/bsd/openssh/dist/pfilter.c:35:8 #2 0x26e91e in cleanup_exit /public/src.git/crypto/external/bsd/openssh/dist/sshd.c:2197:3 #3 0x7f7ff592dafe in ssh_fatal /public/src.git/crypto/external/bsd/openssh/dist/fatal.c:45:2 #4 0x26df55 in main /public/src.git/crypto/external/bsd/openssh/dist/sshd.c:1518:3 #5 0x265f81 in ___start (/usr/sbin/sshd+0x65f81) #6 0x7f7ff7ef8fff () AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /public/src.git/crypto/external/bsd/openssh/dist/packet.c:420:37 in ssh_packet_connection_is_on_socket ==19930==ABORTING -------------- void pfilter_notify(int a) { #ifndef SMALL int fd; if (blstate == NULL) pfilter_init(); if (blstate == NULL) return; // XXX: 3? fd = packet_connection_is_on_socket() ? packet_get_connection_in() : 3; /// <- packet_connection_is_on_socket() BUG, called without input arguments (void)blacklist_r(blstate, a, fd, "ssh"); if (a == 0) { -----Mg: pfilter.c /* Returns 1 if remote host is connected via socket, 0 if not. */ int ssh_packet_connection_is_on_socket(struct ssh *ssh) { struct session_state *state = ssh->state; struct sockaddr_storage from, to; socklen_t fromlen, tolen; if (state->connection_in == -1 || state->connection_out == -1) -----Mg: packet.c