-
Bug
-
Resolution: Unresolved
-
Major
-
rhel-10.1
-
libsepol-3.10-1.el10
-
No
-
Moderate
-
rhel-security-selinux
-
5
-
QE ack
-
False
-
False
-
-
No
-
None
-
Unspecified Release Note Type - Unknown
-
Unspecified
-
Unspecified
-
Unspecified
-
None
[OpenScanHub] Scan of libsepol-3.10-1.el10:
Defect type: RESOURCE_LEAK 5. libsepol-3.10/src/expand.c:828:2: alloc_arg: "map_ebitmap" allocates memory that is stored into "mapped.node". 15. libsepol-3.10/src/expand.c:68:3: alloc_arg: "ebitmap_set_bit" allocates memory that is stored into "dst->node". 20. libsepol-3.10/src/ebitmap.c:420:2: alloc_fn: Storage is returned from allocation function "malloc". 21. libsepol-3.10/src/ebitmap.c:420:2: assign: Assigning: "new" = "(ebitmap_node_t *)malloc(24UL)". 25. libsepol-3.10/src/ebitmap.c:437:3: assign: Assigning: "e->node" = "new". 32. libsepol-3.10/src/expand.c:831:3: leaked_storage: Variable "mapped" going out of scope leaks the storage "mapped.node" points to. # 829| return -1; # 830| if (ebitmap_union(&new_role->dominates, &mapped)) # 831|-> return -1; # 832| ebitmap_destroy(&mapped); # 833|
https://osh.prodsec.redhat.com/osh/waiving/194233/358382/#defects
- clones
-
RHEL-146336 Rebase SELinux userspace to 3.10 release [libsepol]
-
- Release Pending
-