#1199 Fix coverity warnings for 'tkstool'
Closed: Fixed None Opened 9 years ago by mharmsen.

Coverity testing of a recent version of the product produced the following warnings:

- pki-core-10.1.2/base/native-tools/src/tkstool/secutil.c:3046:14: warning: Potential leak of memory pointed to by 'optstring' 
- pki-core-10.1.2/base/native-tools/src/tkstool/secutil.c:2474:9: warning: Access to field 'contentTypeTag' results in a dereference of a null pointer (loaded from variable 'src')
- pki-core-10.1.2/base/native-tools/src/tkstool/secutil.c:1422:9: warning: Dereference of null pointer 
- pki-core-10.1.2/base/native-tools/src/tkstool/secutil.c:676:6: warning: Assigned value is garbage or undefined

Proposed milestone: Dogtag 10.2.3


Based upon CS/DS meeting of 11/10/2014: 10.2.3

Per Dogtag 10.2.X meeting of 01/14/2015: Milestone 10.3

Per discussions in the Dogtag 10.3 Triage meeting of 01/06/2016: priority medium

Per CS Bug/Ticket Triage held 04/19/2016: 10.3.2

commit ff1b164d033870ad7c708d13f671587f93c50749
Author: Jack Magne jmagne@dhcp-16-206.sjc.redhat.com
Date: Mon Jun 6 16:36:16 2016 -0700

Fix coverity warnings for 'tkstool'

Issues listed in the ticket addressed by this patch.

Ticket #1199 : Fix coverity warnings for 'tkstool'.

Closing

Metadata Update from @mharmsen:
- Issue assigned to jmagne
- Issue set to the milestone: 10.3.3

7 years ago

Dogtag PKI is moving from Pagure issues to GitHub issues. This means that existing or new
issues will be reported and tracked through Dogtag PKI's GitHub Issue tracker.

This issue has been cloned to GitHub and is available here:
https://github.com/dogtagpki/pki/issues/1761

If you want to receive further updates on the issue, please navigate to the
GitHub issue and click on Subscribe button.

Thank you for understanding, and we apologize for any inconvenience.

Login to comment on this ticket.

Metadata