lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170424164127.5a2145e8@xeon-e3>
Date:   Mon, 24 Apr 2017 16:41:27 -0700
From:   Stephen Hemminger <stephen@...workplumber.org>
To:     Jamal Hadi Salim <hadi@...atatu.com>,
        Cong Wang <xiyou.wangcong@...il.com>,
        Jiri Pirko <jiri@...nulli.us>
Cc:     netdev@...r.kernel.org
Subject: Fw: New Defects reported by Coverity Scan for Linux

This looks like a false positive

Date: Mon, 24 Apr 2017 14:40:46 -0700
From: scan-admin@...erity.com
To: stephen@...workplumber.org
Subject: New Defects reported by Coverity Scan for Linux


1 new defect(s) introduced to Linux found with Coverity Scan.
2 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

New defect(s) Reported-by: Coverity Scan
Showing 1 of 1 defect(s)


** CID 1405487:  Resource leaks  (RESOURCE_LEAK)
/net/sched/act_api.c: 635 in tcf_action_init_1()


________________________________________________________________________________________________________
*** CID 1405487:  Resource leaks  (RESOURCE_LEAK)
/net/sched/act_api.c: 635 in tcf_action_init_1()
629     	 * if it exists and is only bound to in a_o->init() then
630     	 * ACT_P_CREATED is not returned (a zero is).
631     	 */
632     	if (err != ACT_P_CREATED)
633     		module_put(a_o->owner);
634     
>>>     CID 1405487:  Resource leaks  (RESOURCE_LEAK)
>>>     Variable "cookie" going out of scope leaks the storage it points to.  
635     	return a;
636     
637     err_mod:
638     	module_put(a_o->owner);
639     err_out:
640     	if (cookie) {

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ