Coverity testing of a recent version of the product produced the following warnings:
- pki-core-10.1.2/base/native-tools/src/tkstool/secutil.c:3046:14: warning: Potential leak of memory pointed to by 'optstring' - pki-core-10.1.2/base/native-tools/src/tkstool/secutil.c:2474:9: warning: Access to field 'contentTypeTag' results in a dereference of a null pointer (loaded from variable 'src') - pki-core-10.1.2/base/native-tools/src/tkstool/secutil.c:1422:9: warning: Dereference of null pointer - pki-core-10.1.2/base/native-tools/src/tkstool/secutil.c:676:6: warning: Assigned value is garbage or undefined
Proposed milestone: Dogtag 10.2.3
Ticket has been cloned to Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1161717
Based upon CS/DS meeting of 11/10/2014: 10.2.3
Per Dogtag 10.2.X meeting of 01/14/2015: Milestone 10.3
Per discussions in the Dogtag 10.3 Triage meeting of 01/06/2016: priority medium
Per CS Bug/Ticket Triage held 04/19/2016: 10.3.2
commit ff1b164d033870ad7c708d13f671587f93c50749 Author: Jack Magne jmagne@dhcp-16-206.sjc.redhat.com Date: Mon Jun 6 16:36:16 2016 -0700
Fix coverity warnings for 'tkstool' Issues listed in the ticket addressed by this patch. Ticket #1199 : Fix coverity warnings for 'tkstool'.
Closing
Metadata Update from @mharmsen: - Issue assigned to jmagne - Issue set to the milestone: 10.3.3
Dogtag PKI is moving from Pagure issues to GitHub issues. This means that existing or new issues will be reported and tracked through Dogtag PKI's GitHub Issue tracker.
This issue has been cloned to GitHub and is available here: https://github.com/dogtagpki/pki/issues/1761
If you want to receive further updates on the issue, please navigate to the GitHub issue and click on Subscribe button.
Subscribe
Thank you for understanding, and we apologize for any inconvenience.
Login to comment on this ticket.