summaryrefslogtreecommitdiff
path: root/auth.c
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2019-10-16 06:05:39 +0000
committerDamien Miller <djm@mindrot.org>2019-10-16 17:08:38 +1100
commit76ed2199491397e0f9902ade80d5271e4a9b2630 (patch)
treebff516c4baa49171ef3e2092088303e751ff7fe1 /auth.c
parent6500c3bc71bf4fe14972c1177e6b93f1164d07a4 (diff)
downloadopenssh-git-76ed2199491397e0f9902ade80d5271e4a9b2630.tar.gz
upstream: potential NULL dereference for revoked hostkeys; reported
by krishnaiah bommu OpenBSD-Commit-ID: 35ff685e7cc9dd2e3fe2e3dfcdcb9bc5c79f6506
Diffstat (limited to 'auth.c')
-rw-r--r--auth.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/auth.c b/auth.c
index ca450f4e..b092f212 100644
--- a/auth.c
+++ b/auth.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: auth.c,v 1.141 2019/10/02 00:42:30 djm Exp $ */
+/* $OpenBSD: auth.c,v 1.142 2019/10/16 06:05:39 djm Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
*
@@ -489,7 +489,7 @@ check_key_in_hostfiles(struct passwd *pw, struct sshkey *key, const char *host,
host_status = check_key_in_hostkeys(hostkeys, key, &found);
if (host_status == HOST_REVOKED)
error("WARNING: revoked key for %s attempted authentication",
- found->host);
+ host);
else if (host_status == HOST_OK)
debug("%s: key for %s found at %s:%ld", __func__,
found->host, found->file, found->line);