-
Bug
-
Resolution: Unresolved
-
Undefined
-
None
-
rhel-10.0.beta
-
None
-
None
-
None
-
rhel-sst-cs-net-perf-services
-
ssg_core_services
-
None
-
False
-
-
None
-
Red Hat Enterprise Linux
-
None
-
None
-
None
-
None
https://cov01.lab.eng.brq2.redhat.com/osh/waiving/122842/304641/
Most can be ignored, but some might have unlikely potential to be triggerable remotely. But just in case, fixing these should be trivial.
5. Defect type: RESOURCE_LEAK
3. bind-9.18.27/lib/dns/gssapictx.c:213:2: alloc_arg: "krb5_get_default_realm" allocates memory that is stored into "krb5_realm_name".
6. bind-9.18.27/lib/dns/gssapictx.c:227:2: noescape: Resource "krb5_realm_name" is not freed or pointed-to in "strcasecmp".
8. bind-9.18.27/lib/dns/gssapictx.c:236:1: leaked_storage: Variable "krb5_realm_name" going out of scope leaks the storage it points to.
- 234| }
- 235| krb5_free_context(krb5_ctx);
- 236|-> }
- 237|
- 238| static OM_uint32
Collapse6. Defect type: RESOURCE_LEAK
3. bind-9.18.27/lib/dns/gssapictx.c:213:2: alloc_arg: "krb5_get_default_realm" allocates memory that is stored into "krb5_realm_name".
6. bind-9.18.27/lib/dns/gssapictx.c:227:2: noescape: Resource "krb5_realm_name" is not freed or pointed-to in "strcasecmp".
8. bind-9.18.27/lib/dns/gssapictx.c:228:3: noescape: Assuming resource "krb5_realm_name" is not freed or pointed-to as ellipsis argument to "gss_log".
9. bind-9.18.27/lib/dns/gssapictx.c:233:3: leaked_storage: Variable "krb5_realm_name" going out of scope leaks the storage it points to. - 231| krb5_realm_name, gss_name);
- 232| krb5_free_context(krb5_ctx);
- 233|-> return;
- 234| }
- 235| krb5_free_context(krb5_ctx);
Collapse7. Defect type: RESOURCE_LEAK
3. bind-9.18.27/lib/dns/gssapictx.c:213:2: alloc_arg: "krb5_get_default_realm" allocates memory that is stored into "krb5_realm_name".
6. bind-9.18.27/lib/dns/gssapictx.c:225:3: leaked_storage: Variable "krb5_realm_name" going out of scope leaks the storage it points to. - 223| gss_name);
- 224| krb5_free_context(krb5_ctx);
- 225|-> return;
- 226| }
- 227| if (strcasecmp(p + 1, krb5_realm_name) != 0) {