You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This commit addresses 13 issues identified in code review:
Critical Issues Fixed:
- Fix NULL pointer dereference in https_resp_cb by checking NULL before use
- Fix NULL pointer dereference in hostname_from_url by validating curl_url_get result
- Fix buffer overflow in addr_list_reduced by validating IP address length
- Fix incorrect fallthrough in https_set_request_version switch statement
- Fix potential integer underflow in dns_poll_cb snprintf calculation
- Add validation for DNS request sizes from network to prevent DoS attacks
- Fix potential memory leak in https_fetch_ctx_init error path
- Fix NULL pointer dereference risk in ring_buffer_free
Medium Priority Issues Fixed:
- Fix signed/unsigned loop logic in dns_server_tcp_respond send loop
- Fix type mismatch in parse_int by using INT_MAX instead of INT32_MAX
- Add portability fallback for accept4 on non-Linux systems
- Fix typo: "listaning" -> "listening" in error message
- Improve documentation for get_io_event return value handling
These fixes improve security, portability, and code robustness.
0 commit comments