Hi,

Please find the latest report on new defect(s) introduced to 
antonyantony/libreswan found with Coverity Scan.

2 new defect(s) introduced to antonyantony/libreswan found with Coverity Scan.
1 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent 
build analyzed by Coverity Scan.

New defect(s) Reported-by: Coverity Scan
Showing 2 of 2 defect(s)


** CID 1537184:  Null pointer dereferences  (FORWARD_NULL)
/programs/pluto/kernel.c: 1233 in unrouted_to_routed_sec_label()


________________________________________________________________________________________________________
*** CID 1537184:  Null pointer dereferences  (FORWARD_NULL)
/programs/pluto/kernel.c: 1233 in unrouted_to_routed_sec_label()
1227            }
1228     }
1229     
1230     bool unrouted_to_routed_sec_label(struct connection *c, struct logger 
*logger)
1231     {
1232            connection_buf cb;
>>>     CID 1537184:  Null pointer dereferences  (FORWARD_NULL)
>>>     Dereferencing null pointer "c".
1233            ldbg(logger,
1234                 "kernel: %s() "PRI_CO" "PRI_CO" "PRI_CONNECTION" routed %s 
sec_label="PRI_SHUNK,
1235                 __func__,
1236                 pri_connection_co(c),
1237                 pri_connection_co(c->clonedfrom),
1238                 pri_connection(c, &cb),

** CID 1537183:  Possible Control flow issues  (DEADCODE)
/programs/pluto/kernel_policy.c: 503 in install_inbound_ipsec_kernel_policy()


________________________________________________________________________________________________________
*** CID 1537183:  Possible Control flow issues  (DEADCODE)
/programs/pluto/kernel_policy.c: 503 in install_inbound_ipsec_kernel_policy()
497     #if defined(HAVE_NFTABLES)
498             bool has_cat = spd->local->child->has_cat;
499     #else
500             bool has_cat = false;
501     #endif
502             if (has_cat) {
>>>     CID 1537183:  Possible Control flow issues  (DEADCODE)
>>>     Execution cannot reach this statement: "add_cat_kernel_policy(&kern...".
503                     add_cat_kernel_policy(&kernel_policy, DIRECTION_INBOUND,
504                                           child->sa.st_logger, where,
505                                           "CAT: add inbound IPsec policy");
506             }
507     
508             if (!kernel_ops_policy_add(KERNEL_POLICY_OP_ADD,


________________________________________________________________________________________________________
To view the defects in Coverity Scan visit, 
https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yq8aBKViEpsZ9KPFMeJd7kKMDjyzu82COVFw1h1aYx-2FtFrefiPxkohPqZgI7DsTRPR5L954NuJuE0J6c4ee-2B5kYq7Zj_Cir5ZFqEb-2Fpy-2FZDdTxjwNXxDWd37ZfwlkdBT1REyQ3-2FgcXk9TJBF9Ey-2FoRyJcqSwvMZFE4CPeW2z-2BgqlPkujAr-2BluOd65H9nbKm5ciZAnwlZ-2FEBHkzPw6ruin18UnvADEZ-2FbOlXjJ8gh3DJ0-2B5plQc4tiUB2vm0sFUYSdIjkfGZ6D4TXbK2ylIxPF-2BCaxsHVw9Z3aAs3Yofvio8UKKxtSNSojca-2F0PIfcjKKbQOoGko-3D

  To manage Coverity Scan email notifications for 
"swan-dev@lists.libreswan.org", click 
https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yped04pjJnmXOsUBtKYNIXxUzCfl-2FUi6sRJtnGH1-2FWXEIl9xkb2JliKiAkqgdujeIgWYvUCIHO1g-2Ba8I-2B0nANYHmrw9-2B13a9hJ7YOPZRdlHcEQfoMvDvjqsfrRNzFQ8lscduvXP5RLkPig71dIKudxiGyxi_Cir5ZFqEb-2Fpy-2FZDdTxjwNXxDWd37ZfwlkdBT1REyQ3-2FgcXk9TJBF9Ey-2FoRyJcqSwvMZFE4CPeW2z-2BgqlPkujAlRL-2Fa6fHxRyR6tvKkkz1r5L-2Fs2ITilraHinTKKye6xskxBT526vQ73R5bD4p2VwS0ooLy13uW7Vr5QIFkkos5JQXOzvusy2fcyBQAALBPg9-2FCLqaMcO8Dx4NgwPb7T9l4QLQMptYEAREVtdCwCyomA-3D

_______________________________________________
Swan-dev mailing list
Swan-dev@lists.libreswan.org
https://lists.libreswan.org/mailman/listinfo/swan-dev

Reply via email to