From 16f1b5ca3f8fe241ca169ac10097c6982b4edc32 Mon Sep 17 00:00:00 2001 From: djm Date: Wed, 9 Apr 2003 10:50:26 +0000 Subject: [PATCH] - markus@cvs.openbsd.org 2003/04/02 14:36:26 [ssh-keysign.c] potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526 --- ChangeLog | 3 +++ ssh-keysign.c | 4 ++-- 2 files changed, 5 insertions(+), 2 deletions(-) diff --git a/ChangeLog b/ChangeLog index c395ef14..e67c9753 100644 --- a/ChangeLog +++ b/ChangeLog @@ -7,6 +7,9 @@ [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c] [readconf.h serverloop.c sshconnect2.c] reapply rekeying chage, tested by henning@, ok djm@ + - markus@cvs.openbsd.org 2003/04/02 14:36:26 + [ssh-keysign.c] + potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526 20030402 - (bal) if IP_TOS is not found or broken don't try to compile in diff --git a/ssh-keysign.c b/ssh-keysign.c index 26c8faad..97a76cd9 100644 --- a/ssh-keysign.c +++ b/ssh-keysign.c @@ -22,7 +22,7 @@ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "includes.h" -RCSID("$OpenBSD: ssh-keysign.c,v 1.10 2003/03/13 11:42:19 markus Exp $"); +RCSID("$OpenBSD: ssh-keysign.c,v 1.11 2003/04/02 14:36:26 markus Exp $"); #include #include @@ -55,7 +55,7 @@ valid_request(struct passwd *pw, char *host, Key **ret, u_char *data, u_int datalen) { Buffer b; - Key *key; + Key *key = NULL; u_char *pkblob; u_int blen, len; char *pkalg, *p; -- 2.45.2