diff options
author | Colin Watson <cjwatson@debian.org> | 2013-11-09 14:02:03 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2013-11-09 14:02:03 +0000 |
commit | 35d1284f225e6b098a09b92afc01d17c73812e6b (patch) | |
tree | 4b41055057078716fe73a415d0c269a48d66ccf6 /authfd.c | |
parent | 327155e6824b3ee13837bdde04e4eb47e147ff46 (diff) | |
parent | 210ca37aa0cdf5499f0ea847ec150fefbfbf7c39 (diff) |
* New upstream release (http://www.openssh.com/txt/release-6.4).
- sshd(8): fix a memory corruption problem triggered during rekeying
when an AES-GCM cipher is selected (closes: #729029). Full details
of the vulnerability are available at:
http://www.openssh.com/txt/gcmrekey.adv
Diffstat (limited to 'authfd.c')
-rw-r--r-- | authfd.c | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: authfd.c,v 1.87 2013/05/17 00:13:13 djm Exp $ */ | 1 | /* $OpenBSD: authfd.c,v 1.88 2013/11/08 00:39:14 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -206,7 +206,7 @@ ssh_get_authentication_connection(void) | |||
206 | if (sock < 0) | 206 | if (sock < 0) |
207 | return NULL; | 207 | return NULL; |
208 | 208 | ||
209 | auth = xmalloc(sizeof(*auth)); | 209 | auth = xcalloc(1, sizeof(*auth)); |
210 | auth->fd = sock; | 210 | auth->fd = sock; |
211 | buffer_init(&auth->identities); | 211 | buffer_init(&auth->identities); |
212 | auth->howmany = 0; | 212 | auth->howmany = 0; |