From: dtucker@openbsd.org Date: Tue, 26 Apr 2022 07:41:44 +0000 (+0000) Subject: upstream: Check sshauthopt_new() for NULL. bz#3425, from X-Git-Tag: V_9_1_P1~184 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=67b7c784769c74fd4d6b147d91e17e1ac1a8a96d;p=thirdparty%2Fopenssh-portable.git upstream: Check sshauthopt_new() for NULL. bz#3425, from tessgauthier at microsoft.com. ok djm@ OpenBSD-Commit-ID: af0315bc3e44aa406daa7e0ae7c2d719a974483f --- diff --git a/auth.c b/auth.c index 58754c070..5809c0b0d 100644 --- a/auth.c +++ b/auth.c @@ -1,4 +1,4 @@ -/* $OpenBSD: auth.c,v 1.154 2022/02/23 11:17:10 djm Exp $ */ +/* $OpenBSD: auth.c,v 1.155 2022/04/26 07:41:44 dtucker Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * @@ -903,7 +903,8 @@ auth_restrict_session(struct ssh *ssh) debug_f("restricting session"); /* A blank sshauthopt defaults to permitting nothing */ - restricted = sshauthopt_new(); + if ((restricted = sshauthopt_new()) == NULL) + fatal_f("sshauthopt_new failed"); restricted->permit_pty_flag = 1; restricted->restricted = 1;