[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [tor/maint-0.2.3] Check whether ei is non-NULL before altering it.



commit e3578d52e4d32483422cb867786373c2b7b493b5
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date:   Mon Feb 11 16:05:03 2013 -0500

    Check whether ei is non-NULL before altering it.
    
    This fixes a crash bug if we fail to generate an extrainfo
    descriptor.
    
    Fixes bug 8208; bugfix on 0.2.3.16-alpha.
---
 changes/bug8208 |    4 ++++
 src/or/router.c |    8 ++++++--
 2 files changed, 10 insertions(+), 2 deletions(-)

diff --git a/changes/bug8208 b/changes/bug8208
new file mode 100644
index 0000000..c85db90
--- /dev/null
+++ b/changes/bug8208
@@ -0,0 +1,4 @@
+  o Minor bugfixes:
+    - Avoid a crash if we fail to generate an extrinfo descriptor.
+      Fixes bug 8208; bugfix on 0.2.3.16-alpha. Found by Coverity;
+      this is CID 718634.
diff --git a/src/or/router.c b/src/or/router.c
index 38f1cdd..350666d 100644
--- a/src/or/router.c
+++ b/src/or/router.c
@@ -1702,9 +1702,13 @@ router_rebuild_descriptor(int force)
        anyway, since they don't have a DirPort, and always connect to the
        bridge authority anonymously.  But just in case they somehow think of
        sending them on an unencrypted connection, don't allow them to try. */
-    ri->cache_info.send_unencrypted = ei->cache_info.send_unencrypted = 0;
+    ri->cache_info.send_unencrypted = 0;
+    if (ei)
+      ei->cache_info.send_unencrypted = 0
   } else {
-    ri->cache_info.send_unencrypted = ei->cache_info.send_unencrypted = 1;
+    ri->cache_info.send_unencrypted = 1;
+    if (ei)
+      ei->cache_info.send_unencrypted = 1;
   }
 
   router_get_router_hash(ri->cache_info.signed_descriptor_body,



_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits