[Bug 2687] Coverity scan fixes
    bugzilla-daemon at bugzilla.mindrot.org 
    bugzilla-daemon at bugzilla.mindrot.org
       
    Sat Mar  4 00:23:55 AEDT 2017
    
    
  
https://bugzilla.mindrot.org/show_bug.cgi?id=2687
--- Comment #2 from Jakub Jelen <jjelen at redhat.com> ---
Created attachment 2954
  --> https://bugzilla.mindrot.org/attachment.cgi?id=2954&action=edit
2nd part with lower priority
few more reports with lower priority and confidence of the need to be
fixed:
krl.c
 * RESOURCE_LEAK: Overwriting "sect" in "sect = NULL" leaks the storage
that "sect" points to.
 * NEGATIVE_RETURNS: "fd" is passed to a parameter that cannot be
negative in case the open() fails.
readconf.c
servconf.c
 * REVERSE_INULL: bogus NULL checks (can't be NULL in any of the cases)
ssh-pkcs11.c
 * NULL_RETURNS: Sanitize return value of sshkey_new()
sshconnect1.c
 * NULL_RETURNS: Sanitize return value of sshkey_new()
sshkey.c
 * NULL_RETURNS: Directly dereferencing parameter "ret".
-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
    
    
More information about the openssh-bugs
mailing list