Skip to content

Commit

Permalink
Don't follow the NULL pointer, not even in debug printouts.
Browse files Browse the repository at this point in the history
Bug reported by Leonhard Knauff.

Closes RADSECPROXY-68.
  • Loading branch information
Linus Nordberg committed Aug 2, 2017
1 parent 950306f commit 32d58a5
Show file tree
Hide file tree
Showing 3 changed files with 6 additions and 1 deletion.
1 change: 1 addition & 0 deletions AUTHORS
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ Fabian Mauchle
Faidon Liambotis
Hans Zandbelt
Kolbjørn Barmen
Leonhard Knauff
Linus Nordberg
Maja Wolniewicz
Milan Sova
Expand Down
1 change: 1 addition & 0 deletions ChangeLog
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@
- Use a listen(2) backlog of 128 (RADSECPROXY-72).

Bug fixes:
- Don't follow NULL the pointer at debug level 5 (RADSECPROXY-68).
- Completely reload CAs and CRLs with cacheExpiry (RADSECPROXY-50).
- Tie Access-Request log lines to response log lines (RADSECPROXY-60).
- Fix a couple of memory leaks and NULL ptr derefs in error cases.
Expand Down
5 changes: 4 additions & 1 deletion hostport.c
Original file line number Diff line number Diff line change
Expand Up @@ -172,7 +172,10 @@ int resolvehostport(struct hostportres *hp, int af, int socktype, uint8_t passiv
}
}
}
debug(DBG_DBG, "%s: %s -> %s", __func__, hp->host, addr2string(hp->addrinfo->ai_addr));
debug(DBG_DBG, "%s: %s -> %s", __func__,
(hp->host ? hp->host : "(src info not available)"),
((hp->addrinfo && hp->addrinfo->ai_addr) ?
addr2string(hp->addrinfo->ai_addr) : "(dst info not available)"));
return 1;

errexit:
Expand Down

0 comments on commit 32d58a5

Please sign in to comment.