From 29bf02dbdd8168d7be04f4f15cff4321833a71c4 Mon Sep 17 00:00:00 2001 From: Stephen Gallagher Date: Mon, 9 Jul 2012 11:39:47 -0400 Subject: Fix potential NULL-dereference Coverity #12801 --- src/responder/sudo/sudosrv_get_sudorules.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) (limited to 'src') diff --git a/src/responder/sudo/sudosrv_get_sudorules.c b/src/responder/sudo/sudosrv_get_sudorules.c index 65e475fb2..13e1224b4 100644 --- a/src/responder/sudo/sudosrv_get_sudorules.c +++ b/src/responder/sudo/sudosrv_get_sudorules.c @@ -325,7 +325,7 @@ errno_t sudosrv_get_rules(struct sudo_cmd_ctx *cmd_ctx) TALLOC_CTX *tmp_ctx = NULL; struct tevent_req *dpreq = NULL; struct dp_callback_ctx *cb_ctx = NULL; - struct sysdb_ctx *sysdb = cmd_ctx->domain->sysdb; + struct sysdb_ctx *sysdb; char **groupnames = NULL; size_t expired_rules_num = 0; struct sysdb_attrs **expired_rules = NULL; @@ -339,6 +339,8 @@ errno_t sudosrv_get_rules(struct sudo_cmd_ctx *cmd_ctx) return EFAULT; } + sysdb = cmd_ctx->domain->sysdb; + tmp_ctx = talloc_new(NULL); if (tmp_ctx == NULL) { DEBUG(SSSDBG_CRIT_FAILURE, ("talloc_new() failed\n")); -- cgit