Skip to content

Commit 9895db2

Browse files
authored
Merge pull request #1228 from mildass/coverity_fixs_maint-1.2
Fix some coverity issues for maint-1.2
2 parents 8e595db + 7ba8fdc commit 9895db2

File tree

3 files changed

+6
-5
lines changed

3 files changed

+6
-5
lines changed

src/OVAL/oval_sexp.c

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -831,6 +831,8 @@ static struct oval_sysent *oval_sexp_to_sysent(struct oval_syschar_model *model,
831831
oval_message_set_text(msg, txt);
832832
oval_sysitem_add_message(item, msg);
833833

834+
free(key);
835+
834836
return (NULL);
835837
}
836838

src/OVAL/probes/probe-api.c

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -259,7 +259,6 @@ bool probe_item_filtered(const SEXP_t *item, const SEXP_t *filters)
259259
}
260260

261261
if (SEXP_list_length(elm_res) > 0) {
262-
free(elm_name);
263262
r0 = probe_ent_getattrval(felm, "entity_check");
264263

265264
if (r0 == NULL)
@@ -270,13 +269,13 @@ bool probe_item_filtered(const SEXP_t *item, const SEXP_t *filters)
270269
SEXP_free(r0);
271270

272271
ores = probe_ent_result_bychk(elm_res, ochk);
273-
SEXP_free(elm_res);
274272
} else {
275-
SEXP_free(elm_res);
276273
ores = OVAL_RESULT_FALSE;
277274
}
278275
SEXP_list_add(ste_res, r0 = SEXP_number_newi_32(ores));
279276
SEXP_free(r0);
277+
SEXP_free(elm_res);
278+
free(elm_name);
280279
}
281280

282281
r0 = probe_ent_getattrval(ste, "operator");

src/SCE/sce_engine.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -512,8 +512,6 @@ xccdf_test_result_type_t sce_engine_eval_rule(struct xccdf_policy *policy, const
512512

513513
if (fork_result == 0)
514514
{
515-
free_env_values(env_values, index_of_first_env_value_not_compiled_in, env_value_count);
516-
517515
// we won't read from the pipes, so close the reading fd
518516
close(stdout_pipefd[0]);
519517
close(stderr_pipefd[0]);
@@ -540,6 +538,8 @@ xccdf_test_result_type_t sce_engine_eval_rule(struct xccdf_policy *policy, const
540538
// we are the child process
541539
execve(tmp_href, argvp, env_values);
542540

541+
free_env_values(env_values, index_of_first_env_value_not_compiled_in, env_value_count);
542+
543543
// no need to check the return value of execve, if it returned at all we are in trouble
544544
printf("Unexpected error when executing script '%s'. Error message follows.\n", href);
545545
perror("execve");

0 commit comments

Comments
 (0)