Uploaded image for project: 'WildFly Core'
  1. WildFly Core
  2. WFCORE-2517

Coverity, Dereference after null check (Elytron subsystem)

    XMLWordPrintable

Details

    • Bug
    • Resolution: Done
    • Major
    • 3.0.0.Beta14
    • None
    • Security
    • None

    Description

      Coverity found possible dereference of null. In this code defaultPolicy is checked for null and in next step defaultPolicy.equals() is called.

      https://scan7.coverity.com/reports.htm#v23632/p12663/fileInstanceId=10578397&defectInstanceId=2572005&mergedDefectId=1407435

      PolicyParser.java
              boolean providerFound = defaultPolicy == null;
      
              while (reader.hasNext() && reader.nextTag() != END_ELEMENT) {
                  verifyNamespace(reader);
                  String localName = reader.getLocalName();
                  switch (localName) {
                      // Permission Mapper
                      case JACC_POLICY:
                          providerFound = defaultPolicy.equals(parseJaccPolicy(addPolicy, reader, operations)) || providerFound;
                          break;
                      case CUSTOM_POLICY:
                          providerFound = defaultPolicy.equals(parseCustomPolicy(addPolicy, reader, operations)) || providerFound;
                          break;
                      default:
                          throw unexpectedElement(reader);
                  }
              }
      

      Attachments

        Issue Links

          Activity

            People

              rhn-support-ivassile Ilia Vassilev
              mchoma@redhat.com Martin Choma
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: