From 76ed2199491397e0f9902ade80d5271e4a9b2630 Mon Sep 17 00:00:00 2001 From: "djm@openbsd.org" Date: Wed, 16 Oct 2019 06:05:39 +0000 Subject: upstream: potential NULL dereference for revoked hostkeys; reported by krishnaiah bommu OpenBSD-Commit-ID: 35ff685e7cc9dd2e3fe2e3dfcdcb9bc5c79f6506 --- auth.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'auth.c') diff --git a/auth.c b/auth.c index ca450f4e4..b092f212c 100644 --- a/auth.c +++ b/auth.c @@ -1,4 +1,4 @@ -/* $OpenBSD: auth.c,v 1.141 2019/10/02 00:42:30 djm Exp $ */ +/* $OpenBSD: auth.c,v 1.142 2019/10/16 06:05:39 djm Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * @@ -489,7 +489,7 @@ check_key_in_hostfiles(struct passwd *pw, struct sshkey *key, const char *host, host_status = check_key_in_hostkeys(hostkeys, key, &found); if (host_status == HOST_REVOKED) error("WARNING: revoked key for %s attempted authentication", - found->host); + host); else if (host_status == HOST_OK) debug("%s: key for %s found at %s:%ld", __func__, found->host, found->file, found->line); -- cgit v1.2.3