Ok I was quite sure that CERT_LIST_HEAD was already guarding us from
NULL pointers (as in many NSS places i didn't see the check) but it's
not the case [1], so thanks!

[1] https://searchfox.org/mozilla-
central/source/security/nss/lib/certdb/certt.h#361

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1905790

Title:
  Make SSSD in 20.04 using OpenSSL and p11-kit (instead of NSS) for
  p11_child

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ca-certificates/+bug/1905790/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to