Fix an input validation error that can result in an integer overflow
and privilege escalation.

Apply by doing:
       cd /usr/src
       patch -p0 < 006_sshpreauth.patch
       cd usr.bin/ssh
       make obj
       make cleandir
       make depend
       make && make install

Index: auth2-chall.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v
retrieving revision 1.18
diff -u -r1.18 auth2-chall.c
--- usr.bin/ssh/auth2-chall.c       19 Jun 2002 00:27:55 -0000      1.18
+++ usr.bin/ssh/auth2-chall.c       26 Jun 2002 09:37:03 -0000
@@ -256,6 +256,8 @@

       authctxt->postponed = 0;        /* reset */
       nresp = packet_get_int();
+       if (nresp > 100)
+               fatal("input_userauth_info_response: nresp too big %u", nresp);
       if (nresp > 0) {
               response = xmalloc(nresp * sizeof(char*));
       for (i = 0; i < nresp; i++)