summaryrefslogtreecommitdiff
path: root/authfd.c
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2013-11-09 14:02:03 +0000
committerColin Watson <cjwatson@debian.org>2013-11-09 14:02:03 +0000
commit35d1284f225e6b098a09b92afc01d17c73812e6b (patch)
tree4b41055057078716fe73a415d0c269a48d66ccf6 /authfd.c
parent327155e6824b3ee13837bdde04e4eb47e147ff46 (diff)
parent210ca37aa0cdf5499f0ea847ec150fefbfbf7c39 (diff)
* New upstream release (http://www.openssh.com/txt/release-6.4).
- sshd(8): fix a memory corruption problem triggered during rekeying when an AES-GCM cipher is selected (closes: #729029). Full details of the vulnerability are available at: http://www.openssh.com/txt/gcmrekey.adv
Diffstat (limited to 'authfd.c')
-rw-r--r--authfd.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/authfd.c b/authfd.c
index 775786bee..5cce93b76 100644
--- a/authfd.c
+++ b/authfd.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: authfd.c,v 1.87 2013/05/17 00:13:13 djm Exp $ */ 1/* $OpenBSD: authfd.c,v 1.88 2013/11/08 00:39:14 djm Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -206,7 +206,7 @@ ssh_get_authentication_connection(void)
206 if (sock < 0) 206 if (sock < 0)
207 return NULL; 207 return NULL;
208 208
209 auth = xmalloc(sizeof(*auth)); 209 auth = xcalloc(1, sizeof(*auth));
210 auth->fd = sock; 210 auth->fd = sock;
211 buffer_init(&auth->identities); 211 buffer_init(&auth->identities);
212 auth->howmany = 0; 212 auth->howmany = 0;