Bug 758191 - cppcheck reports memoryleak in dump/optr.c
Summary: cppcheck reports memoryleak in dump/optr.c
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: dump
Version: 6.5
Hardware: All
OS: Linux
unspecified
low
Target Milestone: rc
: ---
Assignee: Josef Ridky
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks: 1499211
TreeView+ depends on / blocked
 
Reported: 2011-11-29 13:58 UTC by Dalibor Pospíšil
Modified: 2017-10-06 11:36 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-09-25 08:29:01 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Dalibor Pospíšil 2011-11-29 13:58:29 UTC
Description of problem:

cppcheck reports:
dump/optr.c: Memory leak: disk [error]

Version-Release number of selected component (if applicable):

dump-0.4b41-6.el5

How reproducible:

always

Steps to Reproduce:
1. run cppcheck on the package
  
Actual results:

"dump/optr.c: Memory leak: disk [error]" in output

Expected results:

no memory leaks

Comment 1 Ondrej Vasik 2011-11-29 14:26:45 UTC
Please provide LINE of the leak as well ... otherwise these defect reports are not very useful.

Comment 4 RHEL Program Management 2012-06-12 01:15:34 UTC
This request was evaluated by Red Hat Product Management for
inclusion in the current release of Red Hat Enterprise Linux.
Because the affected component is not scheduled to be updated in the
current release, Red Hat is unfortunately unable to address this
request at this time. Red Hat invites you to ask your support
representative to propose this request, if appropriate and relevant,
in the next release of Red Hat Enterprise Linux.

Comment 5 Adam Tkac 2013-03-12 17:49:44 UTC
Since RHEL 5 is now in production phase 2 (only important/critical bugs are fixed) and this is not important issue, I'm moving this bug to RHEL-6.

Comment 7 RHEL Program Management 2013-10-14 00:53:50 UTC
This request was evaluated by Red Hat Product Management for
inclusion in the current release of Red Hat Enterprise Linux.
Because the affected component is not scheduled to be updated
in the current release, Red Hat is unable to address this
request at this time.

Red Hat invites you to ask your support representative to
propose this request, if appropriate, in the next release of
Red Hat Enterprise Linux.

Comment 8 Josef Ridky 2017-09-25 08:29:01 UTC
Red Hat Enterprise Linux 6 is in the Production 3 Phase. During the
Production 3 Phase, Critical impact Security Advisories (RHSAs) and
selected Urgent Priority Bug Fix Advisories (RHBAs) may be released as
they become available.

The official life cycle policy can be reviewed here:

http://redhat.com/rhel/lifecycle

This issue does not meet the inclusion criteria for the Production 3 Phase
and will be marked as CLOSED/WONTFIX. If this remains a critical
requirement, please contact Red Hat Customer Support to request
a re-evaluation of the issue, citing a clear business justification. Note
that a strong business justification will be required for re-evaluation.
Red Hat Customer Support can be contacted via the Red Hat Customer Portal
at the following URL:

https://access.redhat.com/


Note You need to log in before you can comment on or make changes to this bug.