summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2008-07-04 12:54:25 +1000
committerDarren Tucker <dtucker@zip.com.au>2008-07-04 12:54:25 +1000
commitf5cafb0c850a3b6cc7db27fa79afbd4fb185f8f2 (patch)
tree1d6afb69e3137f947b0f1a48d5bb4a9885aa91db
parent9a2a60986bf33414acf63b6d92d93a2f690c3a17 (diff)
- otto@cvs.openbsd.org 2008/07/03 21:46:58
[auth2-pubkey.c] avoid nasty double free; ok dtucker@ djm@
-rw-r--r--ChangeLog5
-rw-r--r--auth2-pubkey.c3
2 files changed, 5 insertions, 3 deletions
diff --git a/ChangeLog b/ChangeLog
index c35092898..dad3f2a32 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -9,6 +9,9 @@
9 enabled, delay the fork until after replies for any -R forwards have 9 enabled, delay the fork until after replies for any -R forwards have
10 been seen. Allows for robust detection of -R forward failure when 10 been seen. Allows for robust detection of -R forward failure when
11 using -f (similar to bz#92); ok dtucker@ 11 using -f (similar to bz#92); ok dtucker@
12 - otto@cvs.openbsd.org 2008/07/03 21:46:58
13 [auth2-pubkey.c]
14 avoid nasty double free; ok dtucker@ djm@
12 15
1320080702 1620080702
14 - (dtucker) OpenBSD CVS Sync 17 - (dtucker) OpenBSD CVS Sync
@@ -4544,4 +4547,4 @@
4544 OpenServer 6 and add osr5bigcrypt support so when someone migrates 4547 OpenServer 6 and add osr5bigcrypt support so when someone migrates
4545 passwords between UnixWare and OpenServer they will still work. OK dtucker@ 4548 passwords between UnixWare and OpenServer they will still work. OK dtucker@
4546 4549
4547$Id: ChangeLog,v 1.5050 2008/07/04 02:53:50 dtucker Exp $ 4550$Id: ChangeLog,v 1.5051 2008/07/04 02:54:25 dtucker Exp $
diff --git a/auth2-pubkey.c b/auth2-pubkey.c
index daa751ca0..b1e38e5f5 100644
--- a/auth2-pubkey.c
+++ b/auth2-pubkey.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: auth2-pubkey.c,v 1.18 2008/07/02 12:03:51 dtucker Exp $ */ 1/* $OpenBSD: auth2-pubkey.c,v 1.19 2008/07/03 21:46:58 otto Exp $ */
2/* 2/*
3 * Copyright (c) 2000 Markus Friedl. All rights reserved. 3 * Copyright (c) 2000 Markus Friedl. All rights reserved.
4 * 4 *
@@ -195,7 +195,6 @@ user_key_allowed2(struct passwd *pw, Key *key, char *file)
195 f = auth_openkeyfile(file, pw, options.strict_modes); 195 f = auth_openkeyfile(file, pw, options.strict_modes);
196 196
197 if (!f) { 197 if (!f) {
198 xfree(file);
199 restore_uid(); 198 restore_uid();
200 return 0; 199 return 0;
201 } 200 }