diff options
author | Nick Mathewson <nickm@torproject.org> | 2018-07-16 07:51:11 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2018-07-16 07:51:11 -0400 |
commit | 8505522e508c8d2379afbd86154a910948cf8c70 (patch) | |
tree | b7c65f0a341c5ec43328e74ba1caf9c7eb4f874b /src/feature | |
parent | ef234ba303a358f956d4c2afded388b54cfc91bc (diff) | |
download | tor-8505522e508c8d2379afbd86154a910948cf8c70.tar.gz tor-8505522e508c8d2379afbd86154a910948cf8c70.zip |
Avoid a use-after-null-check in proto_socks.c
Coverity rightly complains that early in the function we're checking
whether username is NULL, and later we're passing it unconditionally
to strlen().
Fixes CID 1437967. Bug not in any released Tor.
Diffstat (limited to 'src/feature')
0 files changed, 0 insertions, 0 deletions