-
Bug
-
Resolution: Done-Errata
-
Normal
-
rhel-10.0.beta
-
None
-
libsemanage-3.7-4.el10
-
None
-
Low
-
3
-
rhel-security-selinux
-
ssg_security
-
17
-
2
-
False
-
False
-
-
No
-
SELINUX 241016 - 241106, SELINUX 241106 - 241127, SELINUX 241127 - 241218
-
Unspecified Release Note Type - Unknown
-
None
Error: INTEGER_OVERFLOW (CWE-190):
libsemanage-3.6/src/direct_api.c:598: tainted_data_return: Called function "read(fd, data_read + data_read_len, max_len - data_read_len)", and a possible return value may be less than zero.
libsemanage-3.6/src/direct_api.c:598: cast_underflow: An assign of a possibly negative number to an unsigned type, which might trigger an underflow.
libsemanage-3.6/src/direct_api.c:599: overflow: The expression "data_read_len += read_len" is deemed underflowed because at least one of its arguments has underflowed.
libsemanage-3.6/src/direct_api.c:598: overflow: The expression "max_len - data_read_len" is deemed underflowed because at least one of its arguments has underflowed.
libsemanage-3.6/src/direct_api.c:598: overflow_sink: "max_len - data_read_len", which might have underflowed, is passed to "read(fd, data_read + data_read_len, max_len - data_read_len)". [Note: The source code implementation of the function has been overridden by a builtin model.]
# 596| }
# 597|
# 598|-> while ((read_len = read(fd, data_read + data_read_len, max_len - data_read_len)) > 0) {
# 599| data_read_len += read_len;
# 600| if (data_read_len == max_len) {
# 1473|
# 1474| exit:
# 1475|-> strs_destroy(&strs);
# 1476|
# 1477| if (rc != 0) {
- clones
-
RHEL-34810 UNINIT (CWE-457) el10
-
- Closed
-
- links to
-
RHBA-2024:141151
libsemanage bug fix and enhancement update