diff options
author | dtucker@openbsd.org <dtucker@openbsd.org> | 2022-04-26 07:41:44 +0000 |
---|---|---|
committer | Darren Tucker <dtucker@dtucker.net> | 2022-04-27 21:30:01 +1000 |
commit | 67b7c784769c74fd4d6b147d91e17e1ac1a8a96d (patch) | |
tree | 33a00c8db0488bdc7aa67f2cdaee25bef60e4738 /auth.c | |
parent | d571314d14b919fbd7c84a61f9bf2065fc0a6841 (diff) | |
download | openssh-git-67b7c784769c74fd4d6b147d91e17e1ac1a8a96d.tar.gz |
upstream: Check sshauthopt_new() for NULL. bz#3425, from
tessgauthier at microsoft.com. ok djm@
OpenBSD-Commit-ID: af0315bc3e44aa406daa7e0ae7c2d719a974483f
Diffstat (limited to 'auth.c')
-rw-r--r-- | auth.c | 5 |
1 files changed, 3 insertions, 2 deletions
@@ -1,4 +1,4 @@ -/* $OpenBSD: auth.c,v 1.154 2022/02/23 11:17:10 djm Exp $ */ +/* $OpenBSD: auth.c,v 1.155 2022/04/26 07:41:44 dtucker Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * @@ -903,7 +903,8 @@ auth_restrict_session(struct ssh *ssh) debug_f("restricting session"); /* A blank sshauthopt defaults to permitting nothing */ - restricted = sshauthopt_new(); + if ((restricted = sshauthopt_new()) == NULL) + fatal_f("sshauthopt_new failed"); restricted->permit_pty_flag = 1; restricted->restricted = 1; |