upstream: potential NULL dereference for revoked hostkeys; reported

by krishnaiah bommu

OpenBSD-Commit-ID: 35ff685e7cc9dd2e3fe2e3dfcdcb9bc5c79f6506
This commit is contained in:
djm@openbsd.org 2019-10-16 06:05:39 +00:00 committed by Damien Miller
parent 6500c3bc71
commit 76ed219949

4
auth.c
View File

@ -1,4 +1,4 @@
/* $OpenBSD: auth.c,v 1.141 2019/10/02 00:42:30 djm Exp $ */ /* $OpenBSD: auth.c,v 1.142 2019/10/16 06:05:39 djm Exp $ */
/* /*
* Copyright (c) 2000 Markus Friedl. All rights reserved. * Copyright (c) 2000 Markus Friedl. All rights reserved.
* *
@ -489,7 +489,7 @@ check_key_in_hostfiles(struct passwd *pw, struct sshkey *key, const char *host,
host_status = check_key_in_hostkeys(hostkeys, key, &found); host_status = check_key_in_hostkeys(hostkeys, key, &found);
if (host_status == HOST_REVOKED) if (host_status == HOST_REVOKED)
error("WARNING: revoked key for %s attempted authentication", error("WARNING: revoked key for %s attempted authentication",
found->host); host);
else if (host_status == HOST_OK) else if (host_status == HOST_OK)
debug("%s: key for %s found at %s:%ld", __func__, debug("%s: key for %s found at %s:%ld", __func__,
found->host, found->file, found->line); found->host, found->file, found->line);