mirror of
http://git.haproxy.org/git/haproxy.git/
synced 2025-02-22 13:46:52 +00:00
BUG/MINOR: tcpcheck: Fix double free on error path when parsing tcp/http-check
When a "tcp-check" or a "http-check" rule is parsed, we try to get the previous rule in the ruleset to get its index. We must take care to reset the pointer on this rule in case an error is triggered later on the parsing. Otherwise, the same rule may be released twice. For instance, it happens with such line : http-check meth GET uri / ## note there is no "send" parameter This patch must be backported as far as 2.2.
This commit is contained in:
parent
77e376783e
commit
cd03be73d5
@ -3708,6 +3708,7 @@ static int proxy_parse_tcpcheck(char **args, int section, struct proxy *curpx,
|
||||
if (!LIST_ISEMPTY(&rs->rules)) {
|
||||
chk = LIST_PREV(&rs->rules, typeof(chk), list);
|
||||
index = chk->index + 1;
|
||||
chk = NULL;
|
||||
}
|
||||
|
||||
cur_arg = 1;
|
||||
@ -3809,6 +3810,7 @@ static int proxy_parse_httpcheck(char **args, int section, struct proxy *curpx,
|
||||
chk = LIST_PREV(&rs->rules, typeof(chk), list);
|
||||
if (chk->action != TCPCHK_ACT_SEND || !(chk->send.http.flags & TCPCHK_SND_HTTP_FROM_OPT))
|
||||
index = chk->index + 1;
|
||||
chk = NULL;
|
||||
}
|
||||
|
||||
if (strcmp(args[cur_arg], "connect") == 0)
|
||||
|
Loading…
Reference in New Issue
Block a user