-
Bug
-
Resolution: Done
-
Normal
-
rhel-10.0.beta
-
ipa-4.12.2-1.el10
-
No
-
None
-
2
-
rhel-sst-idm-ipa
-
ssg_idm
-
25
-
26
-
1
-
Dev ack
-
False
-
-
No
-
2024-Q3-Alpha-S4, 2024-Q3-Alpha-S5
-
Pass
-
RegressionOnly
-
Unspecified Release Note Type - Unknown
-
None
Cloned from: https://pagure.io/freeipa/issue/9367 After running Covscan the following issues were found: ``` 2. freeipa-4.9.11/util/ipa_krb5.c:890: alloc_arg: "krb5_get_permitted_enctypes" allocates memory that is stored into "ktypes". 10. freeipa-4.9.11/util/ipa_krb5.c:901: leaked_storage: Variable "ktypes" going out of scope leaks the storage it points to. # 899| if (NULL == ksdata) { # 900| *err_msg = _("Out of memory!?\n"); # 901|-> return 0; # 902| } # 903| ``` ``` 9. freeipa-4.9.11/daemons/ipa-otpd/forward.c:121: alloc_fn: Storage is returned from allocation function "krb5_get_error_message". 10. freeipa-4.9.11/daemons/ipa-otpd/forward.c:121: noescape: Resource "krb5_get_error_message(ctx.kctx, retval)" is not freed or pointed-to in "otpd_log_req_". 11. freeipa-4.9.11/daemons/ipa-otpd/forward.c:121: leaked_storage: Failing to save or free storage allocated by "krb5_get_error_message(ctx.kctx, retval)" leaks it. # 119| error: # 120| if (retval != 0) # 121|-> otpd_log_req((*item)->req, "forward end: %s", # 122| krb5_get_error_message(ctx.kctx, retval)); # 123| return retval; ``` ``` 4. freeipa-4.9.11/daemons/ipa-otpd/forward.c:46: alloc_fn: Storage is returned from allocation function "krb5_get_error_message". 5. freeipa-4.9.11/daemons/ipa-otpd/forward.c:46: noescape: Resource "(retval == 0) ? krad_code_num2name(code) : krb5_get_error_message(ctx.kctx, retval)" is not freed or pointed-to in "otpd_log_req_". 6. freeipa-4.9.11/daemons/ipa-otpd/forward.c:46: leaked_storage: Failing to save or free storage allocated by "krb5_get_error_message(ctx.kctx, retval)" leaks it. # 44| } # 45| # 46|-> otpd_log_req(item->req, "forward end: %s", # 47| retval == 0 # 48| ? krad_code_num2name(code) ``` ``` 6. freeipa-4.9.11/daemons/ipa-otpd/bind.c:121: alloc_fn: Storage is returned from allocation function "krb5_get_error_message". 7. freeipa-4.9.11/daemons/ipa-otpd/bind.c:121: var_assign: Assigning: "errstr" = storage returned from "krb5_get_error_message(ctx.kctx, i)". 11. freeipa-4.9.11/daemons/ipa-otpd/bind.c:136: leaked_storage: Variable "errstr" going out of scope leaks the storage it points to. # 134| VERTO_EV_FLAG_IO_READ | # 135| VERTO_EV_FLAG_IO_WRITE); # 136|-> } # 137| # 138| void otpd_on_bind_io(verto_ctx *vctx, verto_ev *ev) ``` ``` 7. freeipa-4.9.11/client/ipa-rmkeytab.c:158: alloc_arg: "krb5_kt_start_seq_get" allocates memory that is stored into "kt_cursor". 14. freeipa-4.9.11/client/ipa-rmkeytab.c:175: leaked_storage: Variable "kt_cursor" going out of scope leaks the storage it points to. # 173| done: # 174| # 175|-> return rval; # 176| } # 177| ``` ``` 3. freeipa-4.9.11/client/ipa-rmkeytab.c:131: alloc_arg: "krb5_unparse_name" allocates memory that is stored into "entry_princ_s". 6. freeipa-4.9.11/client/ipa-rmkeytab.c:152: identity_transfer: Passing "entry_princ_s" as argument 1 to function "strstr", which returns an offset off that argument. 7. freeipa-4.9.11/client/ipa-rmkeytab.c:152: noescape: Resource "entry_princ_s" is not freed or pointed-to in "strstr". 9. freeipa-4.9.11/client/ipa-rmkeytab.c:154: noescape: Resource "entry_princ_s" is not freed or pointed-to in "remove_principal". 12. freeipa-4.9.11/client/ipa-rmkeytab.c:175: leaked_storage: Variable "entry_princ_s" going out of scope leaks the storage it points to. # 173| done: # 174| # 175|-> return rval; # 176| } # 177| ``` ``` 12. freeipa-4.9.11/client/ipa-getkeytab.c:251: alloc_arg: "krb5_init_context" allocates memory that is stored into "krbctx". 14. freeipa-4.9.11/client/ipa-getkeytab.c:262: noescape: Resource "krbctx" is not freed or pointed-to in "krb5_unparse_name". 29. freeipa-4.9.11/client/ipa-getkeytab.c:291: leaked_storage: Variable "krbctx" going out of scope leaks the storage it points to. # 289| } # 290| } # 291|-> return ret; # 292| } # 293| ```
- links to
-
RHSA-2024:133524 ipa bug fix and enhancement update