[Bug 2687] Coverity scan fixes
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Sat Mar 4 00:23:55 AEDT 2017
https://bugzilla.mindrot.org/show_bug.cgi?id=2687
--- Comment #2 from Jakub Jelen <jjelen at redhat.com> ---
Created attachment 2954
--> https://bugzilla.mindrot.org/attachment.cgi?id=2954&action=edit
2nd part with lower priority
few more reports with lower priority and confidence of the need to be
fixed:
krl.c
* RESOURCE_LEAK: Overwriting "sect" in "sect = NULL" leaks the storage
that "sect" points to.
* NEGATIVE_RETURNS: "fd" is passed to a parameter that cannot be
negative in case the open() fails.
readconf.c
servconf.c
* REVERSE_INULL: bogus NULL checks (can't be NULL in any of the cases)
ssh-pkcs11.c
* NULL_RETURNS: Sanitize return value of sshkey_new()
sshconnect1.c
* NULL_RETURNS: Sanitize return value of sshkey_new()
sshkey.c
* NULL_RETURNS: Directly dereferencing parameter "ret".
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
More information about the openssh-bugs
mailing list