From 18a89c6ec2f5eaace644ff9cd5c663203b10d970 Mon Sep 17 00:00:00 2001 From: Andreas Schneider Date: Tue, 28 May 2019 08:33:22 +0200 Subject: [PATCH] pki: Avoid a null pointer derefrence CID 1401434 Signed-off-by: Andreas Schneider --- src/pki.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/pki.c b/src/pki.c index 888f21ad..0fbfc115 100644 --- a/src/pki.c +++ b/src/pki.c @@ -2152,13 +2152,14 @@ int ssh_pki_signature_verify(ssh_session session, size_t input_len) { int rc; - enum ssh_keytypes_e key_type = ssh_key_type_plain(key->type); + enum ssh_keytypes_e key_type; if (session == NULL || sig == NULL || key == NULL || input == NULL) { SSH_LOG(SSH_LOG_TRACE, "Bad parameter provided to " "ssh_pki_signature_verify()"); return SSH_ERROR; } + key_type = ssh_key_type_plain(key->type); SSH_LOG(SSH_LOG_FUNCTIONS, "Going to verify a %s type signature",