summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDamien Miller <djm@cvs.openbsd.org>2019-10-16 06:05:40 +0000
committerDamien Miller <djm@cvs.openbsd.org>2019-10-16 06:05:40 +0000
commitc16224c2aec1a615ae3600936a877c2f346a0803 (patch)
tree3523fe1d203265f80e45a6ca6e8d3e28f71fda8e
parent8495ac253455c8d54808cfbbc62375ae12a8fbb6 (diff)
potential NULL dereference for revoked hostkeys; reported by
krishnaiah bommu
-rw-r--r--usr.bin/ssh/auth.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/usr.bin/ssh/auth.c b/usr.bin/ssh/auth.c
index 3e8fe57c7c2..e2c2cc77534 100644
--- a/usr.bin/ssh/auth.c
+++ b/usr.bin/ssh/auth.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: auth.c,v 1.141 2019/10/02 00:42:30 djm Exp $ */
+/* $OpenBSD: auth.c,v 1.142 2019/10/16 06:05:39 djm Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
*
@@ -399,7 +399,7 @@ check_key_in_hostfiles(struct passwd *pw, struct sshkey *key, const char *host,
host_status = check_key_in_hostkeys(hostkeys, key, &found);
if (host_status == HOST_REVOKED)
error("WARNING: revoked key for %s attempted authentication",
- found->host);
+ host);
else if (host_status == HOST_OK)
debug("%s: key for %s found at %s:%ld", __func__,
found->host, found->file, found->line);