-
Bug
-
Resolution: Unresolved
-
Normal
-
rhel-10.0.beta
-
None
-
libsemanage-3.7-4.el10
-
None
-
Low
-
2
-
rhel-sst-security-selinux
-
ssg_security
-
2
-
False
-
-
None
-
SELINUX 241016 - 241106, SELINUX 241106 - 241127
-
None
Error: INTEGER_OVERFLOW (CWE-190): libsemanage-3.6/src/direct_api.c:598: tainted_data_return: Called function "read(fd, data_read + data_read_len, max_len - data_read_len)", and a possible return value may be less than zero. libsemanage-3.6/src/direct_api.c:598: cast_underflow: An assign of a possibly negative number to an unsigned type, which might trigger an underflow. libsemanage-3.6/src/direct_api.c:599: overflow: The expression "data_read_len += read_len" is deemed underflowed because at least one of its arguments has underflowed. libsemanage-3.6/src/direct_api.c:598: overflow: The expression "max_len - data_read_len" is deemed underflowed because at least one of its arguments has underflowed. libsemanage-3.6/src/direct_api.c:598: overflow_sink: "max_len - data_read_len", which might have underflowed, is passed to "read(fd, data_read + data_read_len, max_len - data_read_len)". [Note: The source code implementation of the function has been overridden by a builtin model.] # 596| } # 597| # 598|-> while ((read_len = read(fd, data_read + data_read_len, max_len - data_read_len)) > 0) { # 599| data_read_len += read_len; # 600| if (data_read_len == max_len) { # 1473| # 1474| exit: # 1475|-> strs_destroy(&strs); # 1476| # 1477| if (rc != 0) {
- clones
-
RHEL-34810 UNINIT (CWE-457) el10
- Release Pending
- links to
-
RHBA-2024:141151 libsemanage bug fix and enhancement update