[tor-commits] [tor/master] Avoid null-pointer deref in pathbias_is_new_circ_attempt
nickm at torproject.org
nickm at torproject.org
Mon Feb 11 22:06:32 UTC 2013
commit f3835bcb37b56478adab7bee312cda2344190b38
Author: Nick Mathewson <nickm at torproject.org>
Date: Mon Feb 11 16:59:21 2013 -0500
Avoid null-pointer deref in pathbias_is_new_circ_attempt
Coverity is worried about this (CID 980653). It hasn't happened in
testing, but we might as well make sure it can't happen.
---
src/or/circuitbuild.c | 6 ++++--
1 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/src/or/circuitbuild.c b/src/or/circuitbuild.c
index b9a4f89..163afd3 100644
--- a/src/or/circuitbuild.c
+++ b/src/or/circuitbuild.c
@@ -1307,7 +1307,8 @@ pathbias_is_new_circ_attempt(origin_circuit_t *circ)
/* cpath is a circular list. We want circs with more than one hop,
* and the second hop must be waiting for keys still (it's just
* about to get them). */
- return circ->cpath->next != circ->cpath &&
+ return circ->cpath &&
+ circ->cpath->next != circ->cpath &&
circ->cpath->next->state == CPATH_STATE_AWAITING_KEYS;
#else
/* If tagging attacks are no longer possible, we probably want to
@@ -1315,7 +1316,8 @@ pathbias_is_new_circ_attempt(origin_circuit_t *circ)
* timing-based tagging is still more useful than per-hop failure.
* In which case, we'd never want to use this.
*/
- return circ->cpath->state == CPATH_STATE_AWAITING_KEYS;
+ return circ->cpath &&
+ circ->cpath->state == CPATH_STATE_AWAITING_KEYS;
#endif
}
More information about the tor-commits
mailing list