This repository was archived by the owner on Jan 26, 2026. It is now read-only.
Commit e8dfbb8
CVE-2023-2283:pki_crypto: Fix possible authentication bypass
The return value is changed by the call to pki_key_check_hash_compatible
causing the possibility of returning SSH_OK if memory allocation error
happens later in the function.
The assignment of SSH_ERROR if the verification fails is no longer needed,
because the value of the variable is already SSH_ERROR.
Signed-off-by: Norbert Pocs <npocs@redhat.com>
Reviewed-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>1 parent dc1254d commit e8dfbb8
1 file changed
Lines changed: 18 additions & 14 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
3175 | 3175 | | |
3176 | 3176 | | |
3177 | 3177 | | |
| 3178 | + | |
| 3179 | + | |
| 3180 | + | |
| 3181 | + | |
3178 | 3182 | | |
3179 | | - | |
| 3183 | + | |
3180 | 3184 | | |
3181 | 3185 | | |
3182 | 3186 | | |
| |||
3191 | 3195 | | |
3192 | 3196 | | |
3193 | 3197 | | |
3194 | | - | |
3195 | | - | |
| 3198 | + | |
| 3199 | + | |
3196 | 3200 | | |
3197 | 3201 | | |
3198 | 3202 | | |
| |||
3237 | 3241 | | |
3238 | 3242 | | |
3239 | 3243 | | |
3240 | | - | |
3241 | | - | |
| 3244 | + | |
| 3245 | + | |
3242 | 3246 | | |
3243 | 3247 | | |
3244 | 3248 | | |
3245 | 3249 | | |
3246 | 3250 | | |
3247 | 3251 | | |
3248 | 3252 | | |
3249 | | - | |
| 3253 | + | |
3250 | 3254 | | |
3251 | | - | |
3252 | | - | |
| 3255 | + | |
| 3256 | + | |
3253 | 3257 | | |
3254 | 3258 | | |
3255 | 3259 | | |
3256 | 3260 | | |
3257 | 3261 | | |
3258 | 3262 | | |
3259 | | - | |
| 3263 | + | |
3260 | 3264 | | |
3261 | | - | |
3262 | | - | |
3263 | | - | |
3264 | | - | |
| 3265 | + | |
3265 | 3266 | | |
3266 | 3267 | | |
3267 | 3268 | | |
3268 | | - | |
| 3269 | + | |
3269 | 3270 | | |
3270 | 3271 | | |
| 3272 | + | |
| 3273 | + | |
| 3274 | + | |
3271 | 3275 | | |
3272 | 3276 | | |
3273 | 3277 | | |
| |||
0 commit comments