Blame SOURCES/0021-clang-Garbage-value-possible.patch

9e5f05
From 3727376f8654f9e1dd88b1f9721124f9fc96ad0a Mon Sep 17 00:00:00 2001
9e5f05
From: Rob Crittenden <rcritten@redhat.com>
9e5f05
Date: Mon, 8 Oct 2018 14:44:05 -0400
9e5f05
Subject: [PATCH 21/25] clang: Garbage value possible
9e5f05
9e5f05
Need to add guard so that error was only considered if the
9e5f05
certificate was decodable and an import was attempted.
9e5f05
---
9e5f05
 src/certsave-n.c | 4 +++-
9e5f05
 1 file changed, 3 insertions(+), 1 deletion(-)
9e5f05
9e5f05
diff --git a/src/certsave-n.c b/src/certsave-n.c
9e5f05
index 972a1dfa..30e242c1 100644
9e5f05
--- a/src/certsave-n.c
9e5f05
+++ b/src/certsave-n.c
9e5f05
@@ -498,6 +498,7 @@ cm_certsave_n_main(int fd, struct cm_store_ca *ca, struct cm_store_entry *entry,
9e5f05
 					}
9e5f05
 				}
9e5f05
 				/* Import the certificate. */
9e5f05
+				error = SECFailure;
9e5f05
 				newcert = CERT_DecodeCertFromPackage((char *)item->data, item->len);
9e5f05
 				if (newcert != NULL) {
9e5f05
 					error = PK11_ImportCert(sle->slot,
9e5f05
@@ -506,7 +507,7 @@ cm_certsave_n_main(int fd, struct cm_store_ca *ca, struct cm_store_entry *entry,
9e5f05
 						entry->cm_cert_nickname,
9e5f05
 						PR_FALSE);
9e5f05
 				}
9e5f05
-				if (error == SECSuccess) {
9e5f05
+				if ((newcert != NULL) && (error == SECSuccess)) {
9e5f05
 					cm_log(1, "Imported certificate with "
9e5f05
 					       "nickname \"%s\".\n",
9e5f05
 					       entry->cm_cert_nickname);
9e5f05
@@ -581,6 +582,7 @@ cm_certsave_n_main(int fd, struct cm_store_ca *ca, struct cm_store_entry *entry,
9e5f05
 						CERT_DestroyCertList(certlist);
9e5f05
 					}
9e5f05
 				} else {
9e5f05
+					ec = PORT_GetError();
9e5f05
 					if (ec != 0) {
9e5f05
 						es = PR_ErrorToName(ec);
9e5f05
 					} else {
9e5f05
-- 
9e5f05
2.21.0
9e5f05