mirror of
http://git.haproxy.org/git/haproxy.git/
synced 2025-04-16 20:15:49 +00:00
BUG/MINOR: ssl: potential null pointer dereference in ckchs_dup()
A potential null pointer dereference was reported with an old gcc version (6.5) src/ssl_ckch.c: In function 'cli_parse_set_cert': src/ssl_ckch.c:844:7: error: potential null pointer dereference [-Werror=null-dereference] if (!ssl_sock_copy_cert_key_and_chain(src->ckch, dst->ckch)) ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ src/ssl_ckch.c:844:7: error: potential null pointer dereference [-Werror=null-dereference] src/ssl_ckch.c: In function 'ckchs_dup': src/ssl_ckch.c:844:7: error: potential null pointer dereference [-Werror=null-dereference] if (!ssl_sock_copy_cert_key_and_chain(src->ckch, dst->ckch)) ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ src/ssl_ckch.c:844:7: error: potential null pointer dereference [-Werror=null-dereference] This could happen if ckch_store_new() fails to allocate memory and returns NULL. This patch must be backported with 8f71298 since it was wrongly fixed and the bug could happen. Must be backported as far as 2.2.
This commit is contained in:
parent
d8aa21a611
commit
6ac61e39c4
@ -840,6 +840,8 @@ struct ckch_store *ckchs_dup(const struct ckch_store *src)
|
||||
return NULL;
|
||||
|
||||
dst = ckch_store_new(src->path);
|
||||
if (!dst)
|
||||
return NULL;
|
||||
|
||||
if (!ssl_sock_copy_cert_key_and_chain(src->ckch, dst->ckch))
|
||||
goto error;
|
||||
|
Loading…
Reference in New Issue
Block a user