For completeness, here's the Coverity output that we generated while
looking at this. The handful of FORWARD_NULL checks looks like Coverity
not understanding golang, but the handful of cases of: "Passing null
pointer "res" to "CheckResponse", which dereferences it." that I
inspected all looked like legitimate findings that should be addressed.

The "Execution cannot reach this statement:" results probably need
inspection.

Probably all the old crypto stuff is known and expected. And probably
the integer comparisons that will never be true are known and expected.

Thanks

** Attachment added: "coverity.txt"
   
https://bugs.launchpad.net/ubuntu/+source/google-osconfig-agent/+bug/1891934/+attachment/5467319/+files/coverity.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1891934

Title:
  [MIR] google-osconfig-agent

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/google-osconfig-agent/+bug/1891934/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to