diff options
author | tuexen <tuexen@FreeBSD.org> | 2018-06-06 20:28:17 +0000 |
---|---|---|
committer | tuexen <tuexen@FreeBSD.org> | 2018-06-06 20:28:17 +0000 |
commit | b5d79c08f8475af66eb8eb59836180d07722a301 (patch) | |
tree | 07a62407057d36bd2c3659be08c20734942f8ad9 | |
parent | 12f75115f0a0aae6a49e63fd3a0cd21b9abce23b (diff) | |
download | FreeBSD-src-b5d79c08f8475af66eb8eb59836180d07722a301.zip FreeBSD-src-b5d79c08f8475af66eb8eb59836180d07722a301.tar.gz |
MFstable/11 r334728:
Ensure we are not dereferencing a NULL pointer.
CID: 1385266
Approved by: re (marius@)
-rw-r--r-- | sys/netinet/sctp_indata.c | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/sys/netinet/sctp_indata.c b/sys/netinet/sctp_indata.c index f420d72..a474774 100644 --- a/sys/netinet/sctp_indata.c +++ b/sys/netinet/sctp_indata.c @@ -3619,7 +3619,9 @@ sctp_strike_gap_ack_chunks(struct sctp_tcb *stcb, struct sctp_association *asoc, SCTP_SO_NOT_LOCKED); } /* Make sure to flag we had a FR */ - tp1->whoTo->net_ack++; + if (tp1->whoTo != NULL) { + tp1->whoTo->net_ack++; + } continue; } } |