Closed
Bug 1256169
Opened 8 years ago
Closed 8 years ago
NSS scan-build issues in derive.c
Categories
(NSS :: Libraries, defect)
NSS
Libraries
Tracking
(firefox48 affected)
RESOLVED
FIXED
3.26
Tracking | Status | |
---|---|---|
firefox48 | --- | affected |
People
(Reporter: ekr, Assigned: ttaubert)
References
Details
(Keywords: sec-low)
Attachments
(1 file)
4.63 KB,
patch
|
franziskus
:
review+
|
Details | Diff | Splinter Review |
These seem sort of concerning. Some of them turn failure into success. /Users/ekr/l/checker-278/bin/../libexec/ccc-analyzer -o Darwin15.3.0_ccc-analyzer_64_DBG.OBJ/derive.o -c -g -fPIC -fno-common -pipe -DDARWIN -DHAVE_STRERROR -DHAVE_BSD_FLOCK -Wall -Qunused-arguments -Wno-parentheses-equality -Werror -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_ekr -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_TLS_1_3 -DNSS_SSL_ENABLE_ZLIB -I../../../dist/Darwin15.3.0_ccc-analyzer_64_DBG.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss derive.c derive.c:378:9: warning: Value stored to 'i' is never read i += effKeySize; ^ ~~~~~~~~~~ derive.c:636:5: warning: Value stored to 'rv' is never read rv = SECFailure; ^ ~~~~~~~~~~ derive.c:690:17: warning: Value stored to 'rv' is never read rv = SECSuccess; ^ ~~~~~~~~~~ derive.c:817:21: warning: Value stored to 'rv' is never read rv = SECFailure; ^ ~~~~~~~~~~ derive.c:836:17: warning: Value stored to 'rv' is never read rv = SECFailure; ^ ~~~~~~~~~~ 5 warnings generated.
Reporter | ||
Updated•8 years ago
|
Blocks: nss-scan-build
Comment 1•8 years ago
|
||
Potentially sec-high without knowing the code. If someone investigates and finds these are less damaging we can lower the rating.
Keywords: sec-high
Comment 2•8 years ago
|
||
This code is going the be removed soonish in bug 1252849. So I don't think it is worth investing time here.
Comment 3•8 years ago
|
||
Being for export grade ciphers only this also never used in Firefox. I'd consider this sec-low.
Assignee | ||
Comment 5•8 years ago
|
||
Confirming sec-low, potentially even lower. Some of these are invalid, and some might be possible to exploit when we're OOM but even then we probably wouldn't correctly establish the connection. More importantly, all of these failures are in the pkcs11Bypass code, which is ifdef'ed out in Firefox and is slated for removal in the near future.
Assignee | ||
Updated•8 years ago
|
Assignee: nobody → ttaubert
Status: NEW → ASSIGNED
Assignee | ||
Comment 6•8 years ago
|
||
Attachment #8767974 -
Flags: review?(franziskuskiefer)
Updated•8 years ago
|
Attachment #8767974 -
Flags: review?(franziskuskiefer) → review+
Assignee | ||
Comment 7•8 years ago
|
||
https://hg.mozilla.org/projects/nss/rev/8d884c514bf4
Status: ASSIGNED → RESOLVED
Closed: 8 years ago
Resolution: --- → FIXED
Target Milestone: --- → 3.26
Updated•8 years ago
|
Group: crypto-core-security → core-security-release
Updated•5 years ago
|
Group: core-security-release
You need to log in
before you can comment on or make changes to this bug.
Description
•