[sr-dev] git:master:287d1824: ims_ipsec_pcscf: fixed possible use of uninitialized value in ipsec_forward()

Aleksandar Yosifov alexyosifov at gmail.com
Thu Jun 13 21:05:26 CEST 2019


Module: kamailio
Branch: master
Commit: 287d182453e2818c17d439ff68ddd363a86ef578
URL: https://github.com/kamailio/kamailio/commit/287d182453e2818c17d439ff68ddd363a86ef578

Author: Aleksandar Yosifov <alexyosifov at gmail.com>
Committer: Aleksandar Yosifov <alexyosifov at gmail.com>
Date: 2019-06-13T13:22:58+03:00

ims_ipsec_pcscf: fixed possible use of uninitialized value in ipsec_forward()

- related to calling "*ul.unlock_udomain"

---

Modified: src/modules/ims_ipsec_pcscf/cmd.c

---

Diff:  https://github.com/kamailio/kamailio/commit/287d182453e2818c17d439ff68ddd363a86ef578.diff
Patch: https://github.com/kamailio/kamailio/commit/287d182453e2818c17d439ff68ddd363a86ef578.patch

---

diff --git a/src/modules/ims_ipsec_pcscf/cmd.c b/src/modules/ims_ipsec_pcscf/cmd.c
index 576bf56ded..f696ac9e71 100644
--- a/src/modules/ims_ipsec_pcscf/cmd.c
+++ b/src/modules/ims_ipsec_pcscf/cmd.c
@@ -571,7 +571,7 @@ int ipsec_forward(struct sip_msg* m, udomain_t* d)
         struct cell *t = tmb.t_gett();
         if (!t) {
             LM_ERR("Error getting transaction\n");
-            goto cleanup;
+            return ret;
         }
 
         req = t->uas.request;
@@ -662,7 +662,7 @@ int ipsec_forward(struct sip_msg* m, udomain_t* d)
     struct socket_info * client_sock = grep_sock_info(via_host.af == AF_INET ? &ipsec_listen_addr : &ipsec_listen_addr6, src_port, dst_proto);
     if(!client_sock) {
         LM_ERR("Error calling grep_sock_info() for ipsec client port\n");
-        return -1;
+        goto cleanup;
     }
     m->force_send_socket = client_sock;
 




More information about the sr-dev mailing list