Christian Heimes added the comment:

Coverity complains that your patch has introduced a double free bug. Can you 
have a look, please?

** CID 1021198: Double free (USE_AFTER_FREE)
/Modules/posixmodule.c: 10161
http://scan5.coverity.com:8080//sourcebrowser.htm?projectId=10226#mergedDefectId=1021198


________________________________________________________________________
CID 1021198: Double free (USE_AFTER_FREE)

/Modules/posixmodule.c: 10123 ( freed_arg)
   10120    
   10121            if (length < 0) {
   10122                if (errno == ERANGE) {
>>> "free(void *)" frees "buffer".
   10123                    PyMem_FREE(buffer);
   10124                    continue;
   10125                }
   10126                path_error(&path);
   10127                break;
  

/Modules/posixmodule.c: 10161 ( double_free)
   10158    exit:
   10159        path_cleanup(&path);
   10160        if (buffer)
>>> CID 1021198: Double free (USE_AFTER_FREE)
>>> Calling "free(void *)" frees pointer "buffer" which has already been freed.
   10161            PyMem_FREE(buffer);
   10162        return result;
   10163    }
   10164    
   10165    #endif /* USE_XATTRS */

----------
nosy: +christian.heimes
status: closed -> open

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue17968>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
http://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to