Bug 748011

Summary: Fix various pem module flaws detected by coverity scan
Product: Red Hat Enterprise Linux 6 Reporter: Elio Maldonado Batiz <emaldona>
Component: nssAssignee: Elio Maldonado Batiz <emaldona>
Status: CLOSED DUPLICATE QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 6.3CC: kdudka
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-12-08 20:53:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Attachments:
Description Flags
errors found in the pem module none

Description Elio Maldonado Batiz 2011-10-21 17:27:44 UTC
Created attachment 529541 [details]
errors found in the pem module

Description of problem: detected various flwws in a coverity scan run
some are false positive but most are real

Version-Release number of selected component (if applicable): nss-3.12.10-14.el6

How reproducible: always

Steps to Reproduce:
1. Visit http://releng-test1.englab.brq.redhat.com/covscan/task/184/
2. Download and extract the archive 
http://releng-test1.englab.brq.redhat.com/covscan/task/184/log/nss-3.12.10-14.el6.tar.xz
3. Within that the defects_in_patches.err
  
Actual results: 
Various errors

Expected results: 
None or at most some that can be explained as False Positives

Additional info:

Comment 3 RHEL Program Management 2011-10-26 05:47:12 UTC
Since RHEL 6.2 External Beta has begun, and this bug remains
unresolved, it has been rejected as it is not proposed as
exception or blocker.

Red Hat invites you to ask your support representative to
propose this request, if appropriate and relevant, in the
next release of Red Hat Enterprise Linux.

Comment 4 Kamil Dudka 2011-12-08 20:53:50 UTC
You need to apply the patch that is attached to bug 717913 and pending for review a few months already.

*** This bug has been marked as a duplicate of bug 717913 ***