From: djm@openbsd.org Date: Wed, 16 Oct 2019 06:05:39 +0000 (+0000) Subject: upstream: potential NULL dereference for revoked hostkeys; reported X-Git-Tag: V_8_2_P1~402 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=76ed2199491397e0f9902ade80d5271e4a9b2630;p=thirdparty%2Fopenssh-portable.git upstream: potential NULL dereference for revoked hostkeys; reported by krishnaiah bommu OpenBSD-Commit-ID: 35ff685e7cc9dd2e3fe2e3dfcdcb9bc5c79f6506 --- diff --git a/auth.c b/auth.c index ca450f4e4..b092f212c 100644 --- a/auth.c +++ b/auth.c @@ -1,4 +1,4 @@ -/* $OpenBSD: auth.c,v 1.141 2019/10/02 00:42:30 djm Exp $ */ +/* $OpenBSD: auth.c,v 1.142 2019/10/16 06:05:39 djm Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * @@ -489,7 +489,7 @@ check_key_in_hostfiles(struct passwd *pw, struct sshkey *key, const char *host, host_status = check_key_in_hostkeys(hostkeys, key, &found); if (host_status == HOST_REVOKED) error("WARNING: revoked key for %s attempted authentication", - found->host); + host); else if (host_status == HOST_OK) debug("%s: key for %s found at %s:%ld", __func__, found->host, found->file, found->line);