wiz
|
2950a17537
|
Remove last Kerberos 4 support in non-3RDPARTY code.
|
2006-03-23 23:51:25 +00:00 |
|
wiz
|
417f570853
|
Remove some more references to kerberosIV.
|
2006-03-23 21:51:14 +00:00 |
|
dogcow
|
028f696b68
|
Since KerberosIV has gone away, so should NFSKERB.
|
2006-03-23 15:37:02 +00:00 |
|
riz
|
a27001b755
|
Coverity CID 2757: Don't leak memory in error conditions.
|
2006-03-23 01:27:08 +00:00 |
|
bouyer
|
17cb72c505
|
In add_secure(), change
(status > 0) to (status == 0 && value). It doesn't make sense to handle value
only if there was an error.
Fix coverity ID 1709.
|
2006-03-22 19:54:13 +00:00 |
|
joerg
|
368cb1b951
|
Garbage collect cc in moduser, it is only set once, but never read as
noticed by lint.
|
2006-03-22 18:02:46 +00:00 |
|
joerg
|
5dc48904d3
|
Don't leak FILEs when flock fails. Found by Coverity (CID 1776, 1777 and
1778). Patch by Liam J. Foy, which handles one more case.
|
2006-03-22 18:01:11 +00:00 |
|
christos
|
83daacaaf8
|
Coverity CID 621: Remove dead code.
|
2006-03-22 17:16:09 +00:00 |
|
christos
|
e5f6d71c5b
|
Coverity CID 798: t can only be null if p is null. otherwise p needs to contain
a name.
|
2006-03-22 17:14:16 +00:00 |
|
christos
|
20a63f0a54
|
Coverity CID 888: Detect error when host is not found.
|
2006-03-22 17:10:33 +00:00 |
|
christos
|
2d056bacca
|
Coverity CID 893: Check the pointer for NULL before using anyway, although
in the current situation it cannot happen.
|
2006-03-22 17:05:44 +00:00 |
|
christos
|
76ad3db40d
|
Coverity CID 1644: Plug memory leak.
|
2006-03-22 17:03:29 +00:00 |
|
christos
|
84d29c783e
|
Coverity CID 1645: Fix memory leak.
|
2006-03-22 17:01:47 +00:00 |
|
christos
|
c8f598b3af
|
Coverity CID 1646: Free storage on error
|
2006-03-22 16:58:30 +00:00 |
|
christos
|
2ed64bb14a
|
Coverity CID 1647: Close file on error.
|
2006-03-22 16:57:18 +00:00 |
|
christos
|
4830490bed
|
Coverity CID 1701: Fix memory and descriptor leak on error.
|
2006-03-22 16:56:10 +00:00 |
|
christos
|
821808de71
|
Coverity CID 1708: Close file on error.
|
2006-03-22 16:54:26 +00:00 |
|
christos
|
b8595bc4e5
|
Coverity CID 2581: set variable to NULL after free.
|
2006-03-22 16:45:48 +00:00 |
|
christos
|
18358a0809
|
Coverity CID 2582: Set variables to NULL after freeing.
|
2006-03-22 16:44:30 +00:00 |
|
christos
|
17eb3e6ddd
|
Coverity CID 2583: Appease error by setting name to NULL after free.
|
2006-03-22 16:42:41 +00:00 |
|
itojun
|
d9a428ea1c
|
avoid heap overrun. thanks goes to Susan Lan of zyxel.
|
2006-03-22 09:22:28 +00:00 |
|
christos
|
db1dbe6ce9
|
Coverity CID 1225: Don't close negative fd. While here fix fd leak.
|
2006-03-21 22:49:43 +00:00 |
|
christos
|
4a6e5a625c
|
Coverity CID 1750: Add a function to free a queue and use it.
|
2006-03-21 22:47:26 +00:00 |
|
christos
|
1f548f352a
|
Coverity CID 1752: getq() always allocates a queue if nitems >= 0, so always
free it.
|
2006-03-21 22:37:34 +00:00 |
|
christos
|
85e611dd01
|
Goodbye KerberosIV
|
2006-03-20 04:03:10 +00:00 |
|
phil
|
01ec6393c4
|
Plug resource leak. (CID 1600)
|
2006-03-19 07:04:06 +00:00 |
|
dan
|
bcff75cc37
|
actually toggle the value of dquote when seeing a '"', as I intuit the
author must have intended. Found via coverity CID 579.
|
2006-03-18 22:07:15 +00:00 |
|
dan
|
6ff40a4cfb
|
prevent a potential resource leak, not found by coverity (perhaps masked by previous)
|
2006-03-18 21:41:23 +00:00 |
|
dan
|
3713fec029
|
catch another possible error case and exit early; CID 990
|
2006-03-18 21:35:35 +00:00 |
|
bouyer
|
d663834226
|
Fix memory leak if we're adding an existing group name.
Coverity ID 1568.
|
2006-03-18 14:33:07 +00:00 |
|
rtr
|
b06fd00a81
|
free buf on error path
coverity 190 / run 5
|
2006-03-18 12:35:41 +00:00 |
|
dan
|
1c8b9fae53
|
CIDs 2649, 2650: buf used after free
|
2006-03-18 12:35:19 +00:00 |
|
dsl
|
1ec8e10fce
|
Coverty 7449: Change 'return (0)' to 'goto done' so we free(bootstrapbuf)
before exiting with error.
|
2006-03-18 11:08:19 +00:00 |
|
elad
|
d8af4d8962
|
Change MAX_BLOCKS for b_prop to MAX_PROPS, as it probably should've been.
Fixes overrun found by Coverity, CID 1550.
|
2006-03-18 02:06:38 +00:00 |
|
elad
|
615bdca25f
|
Fix three off-by-ones found by Coverity, CID 1489.
|
2006-03-17 21:10:02 +00:00 |
|
elad
|
35ad67c75e
|
Fix off-by-one found by Coverity, CID 1485.
|
2006-03-17 21:01:02 +00:00 |
|
elad
|
7d1c72d85d
|
Fix off-by-one found by Coverity, CID 1486.
|
2006-03-17 20:48:09 +00:00 |
|
hubertf
|
dc01675c5a
|
Put check if "best" is empty back into the right place, messed up
in previous commit.
Noted by yamt@
|
2006-03-17 17:46:44 +00:00 |
|
christos
|
fca770b32a
|
Appease Coverity CID 2580 [not a bug]
|
2006-03-17 17:06:30 +00:00 |
|
christos
|
227e68b656
|
free memory on allocation failure.
|
2006-03-17 17:04:22 +00:00 |
|
elad
|
fb41d90922
|
Proper bounds access, found by Coverity, CID 1470.
|
2006-03-17 14:40:11 +00:00 |
|
dmcmahill
|
de309be996
|
put the array bounds check _before_ accessing the array.
Coverity CID: 1479
|
2006-03-17 14:20:10 +00:00 |
|
dmcmahill
|
ee00225705
|
put the array bounds check _before_ accessing the array.
Coverity CID: 1480
|
2006-03-17 14:14:45 +00:00 |
|
erh
|
840c5222df
|
Fix -uu handling so recursive updates of already installed packages work,
even if the initial package to install isn't installed yet.
Bump the version to 20060313.
|
2006-03-17 05:32:11 +00:00 |
|
elad
|
8adb45d48c
|
Fix off-by-one found by Coverity, CID 1529.
|
2006-03-17 02:56:05 +00:00 |
|
elad
|
70b1ddf050
|
Overrun found by Coverity, CID 1549.
|
2006-03-17 02:41:31 +00:00 |
|
hubertf
|
986192d148
|
Add sanity check if there's a @cwd in the +CONTENT file.
If not abort, because we wouldn't know where to put the files.
Coverity CID 1358
|
2006-03-17 02:37:31 +00:00 |
|
hubertf
|
3c5de91c39
|
pkg_do(): only use cp2 if it's really set to something useful
Coverity CID 1176
|
2006-03-17 02:31:44 +00:00 |
|
hubertf
|
fc4fb72e38
|
findbestmatchingname_fn(): catch possible problems if best (vp)
contains some strange name (shouldn't happen, but ...)
Coverity CID 869
|
2006-03-17 02:20:46 +00:00 |
|
hubertf
|
92acb1f6e9
|
findbestmatchingname_fn(): only do something sensible if the pointer
handed in is actually usable (not NULL)
Fixes Coverity ID 870
|
2006-03-17 02:10:55 +00:00 |
|