Bug 1777920
Summary: | covscan memory leaks report | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Florence Blanc-Renaud <frenaud> | |
Component: | ipa | Assignee: | Thomas Woerner <twoerner> | |
Status: | CLOSED ERRATA | QA Contact: | ipa-qe <ipa-qe> | |
Severity: | unspecified | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 8.0 | CC: | abokovoy, cheimes, covscan-auto, ksiddiqu, pasik, pcech, rcritten, tscherf | |
Target Milestone: | rc | |||
Target Release: | 8.0 | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | If docs needed, set a value | ||
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1817922 (view as bug list) | Environment: | ||
Last Closed: | 2020-04-28 15:44:12 UTC | Type: | --- | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1817922 |
Description
Florence Blanc-Renaud
2019-11-28 16:38:47 UTC
master: * e3ad78538e1dd2f63f171ef1c2b470a1a4f47a8c covscan: free encryption types in case there is an error * e9dd757763c76402e07f533f19e269eeebc554fa covscan: free ucs2-encoded password copy when generating NTLM hash Fixed upstream master: https://pagure.io/freeipa/c/e3ad78538e1dd2f63f171ef1c2b470a1a4f47a8c https://pagure.io/freeipa/c/e9dd757763c76402e07f533f19e269eeebc554fa ipa-4-8: https://pagure.io/freeipa/c/84592e32c5b59b7b654a0a74b5cc8c1350af6451 https://pagure.io/freeipa/c/eebabb5c5fe7478b391770a857fb9be4f0d60a9c ipa-4-7: https://pagure.io/freeipa/c/212e86eee15e883bffd01f969219ce644c3e45c6 https://pagure.io/freeipa/c/c37081576d2f282e702b42652c04e053886c47cf ipa-4-6: https://pagure.io/freeipa/c/e8983f69ce1788144b2b348a65f709412c68e47e https://pagure.io/freeipa/c/830466c0489466d385a333cb829fe8cd5e59644c Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2020:1640 *** Bug 1917258 has been marked as a duplicate of this bug. *** |