diff options
author | Colin Watson <cjwatson@debian.org> | 2013-11-09 14:02:03 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2013-11-09 14:02:03 +0000 |
commit | 35d1284f225e6b098a09b92afc01d17c73812e6b (patch) | |
tree | 4b41055057078716fe73a415d0c269a48d66ccf6 /auth2-chall.c | |
parent | 327155e6824b3ee13837bdde04e4eb47e147ff46 (diff) | |
parent | 210ca37aa0cdf5499f0ea847ec150fefbfbf7c39 (diff) |
* New upstream release (http://www.openssh.com/txt/release-6.4).
- sshd(8): fix a memory corruption problem triggered during rekeying
when an AES-GCM cipher is selected (closes: #729029). Full details
of the vulnerability are available at:
http://www.openssh.com/txt/gcmrekey.adv
Diffstat (limited to 'auth2-chall.c')
-rw-r--r-- | auth2-chall.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/auth2-chall.c b/auth2-chall.c index 98f3093ce..031c2828c 100644 --- a/auth2-chall.c +++ b/auth2-chall.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: auth2-chall.c,v 1.38 2013/05/17 00:13:13 djm Exp $ */ | 1 | /* $OpenBSD: auth2-chall.c,v 1.39 2013/11/08 00:39:14 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2001 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2001 Markus Friedl. All rights reserved. |
4 | * Copyright (c) 2001 Per Allansson. All rights reserved. | 4 | * Copyright (c) 2001 Per Allansson. All rights reserved. |
@@ -111,7 +111,7 @@ kbdint_alloc(const char *devs) | |||
111 | remove_kbdint_device("pam"); | 111 | remove_kbdint_device("pam"); |
112 | #endif | 112 | #endif |
113 | 113 | ||
114 | kbdintctxt = xmalloc(sizeof(KbdintAuthctxt)); | 114 | kbdintctxt = xcalloc(1, sizeof(KbdintAuthctxt)); |
115 | if (strcmp(devs, "") == 0) { | 115 | if (strcmp(devs, "") == 0) { |
116 | buffer_init(&b); | 116 | buffer_init(&b); |
117 | for (i = 0; devices[i]; i++) { | 117 | for (i = 0; devices[i]; i++) { |