From 67b7c784769c74fd4d6b147d91e17e1ac1a8a96d Mon Sep 17 00:00:00 2001 From: "dtucker@openbsd.org" Date: Tue, 26 Apr 2022 07:41:44 +0000 Subject: upstream: Check sshauthopt_new() for NULL. bz#3425, from tessgauthier at microsoft.com. ok djm@ OpenBSD-Commit-ID: af0315bc3e44aa406daa7e0ae7c2d719a974483f --- auth.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) (limited to 'auth.c') diff --git a/auth.c b/auth.c index 58754c07..5809c0b0 100644 --- a/auth.c +++ b/auth.c @@ -1,4 +1,4 @@ -/* $OpenBSD: auth.c,v 1.154 2022/02/23 11:17:10 djm Exp $ */ +/* $OpenBSD: auth.c,v 1.155 2022/04/26 07:41:44 dtucker Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * @@ -903,7 +903,8 @@ auth_restrict_session(struct ssh *ssh) debug_f("restricting session"); /* A blank sshauthopt defaults to permitting nothing */ - restricted = sshauthopt_new(); + if ((restricted = sshauthopt_new()) == NULL) + fatal_f("sshauthopt_new failed"); restricted->permit_pty_flag = 1; restricted->restricted = 1; -- cgit v1.2.1