Closed Bug 333385 Opened 18 years ago Closed 18 years ago

[@ nsKeygenThread::UserCanceled]

Categories

(Core Graveyard :: Security: UI, defect)

x86
Linux
defect
Not set
critical

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: timeless, Assigned: KaiE)

References

()

Details

(Keywords: coverity, crash)

Crash Data

Attachments

(1 file)

found by coverity

this code wanted to null out its out param, not null out the pointer it needs to use to talk to the out param.
Status: UNCONFIRMED → NEW
Ever confirmed: true
Attached patch Patch v1Splinter Review
Whoops, good catch! That's an evil potential crasher.

(The reason we never hit this one yet, we currently don't allow to cancel the key generation.)
Attachment #218156 - Flags: review?(rrelyea)
Comment on attachment 218156 [details] [diff] [review]
Patch v1

r=relyea.

Clearly setting a pointer to PRBOOL to PR_FALSE is wrong;).
Attachment #218156 - Flags: review?(rrelyea) → review+
checked in
Status: NEW → RESOLVED
Closed: 18 years ago
Resolution: --- → FIXED
Attachment #218156 - Flags: approval-branch-1.8.1+
Crash Signature: [@ nsKeygenThread::UserCanceled]
Product: Core → Core Graveyard
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: