Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
For bugs related to Red Hat Enterprise Linux 5 product line. The current stable release is 5.10. For Red Hat Enterprise Linux 6 and above, please visit Red Hat JIRA https://issues.redhat.com/secure/CreateIssue!default.jspa?pid=12332745 to report new issues.

Bug 850722

Summary: New defect - use of uninitialized value.
Product: Red Hat Enterprise Linux 5 Reporter: Pavel Raiskup <praiskup>
Component: sssdAssignee: Stephen Gallagher <sgallagh>
Status: CLOSED ERRATA QA Contact: Kaushik Banerjee <kbanerje>
Severity: unspecified Docs Contact:
Priority: medium    
Version: 5.9CC: apeetham, dpal, grajaiya, jgalipea, jhrozek, pbrezina
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: sssd-1.5.1-58.el5 Doc Type: Bug Fix
Doc Text:
No documentation needed.
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-01-08 07:24:35 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
List of all defects in sssd-1.5.1-56 none

Description Pavel Raiskup 2012-08-22 08:47:04 UTC
Created attachment 606175 [details]
List of all defects in sssd-1.5.1-56

There was found new small defect between releases:

    sssd-1.5.1-49 ~~> sssd-1.5.1-56

src/providers/ipa/ipa_access.c:131:  uninitialized pointer hbac_ctx
src/providers/ipa/ipa_access.c:141:  goto fail
src/providers/ipa/ipa_access.c:201:  read of uninitialized hbac_ctx

This bug is mentioned just as a warning and it depends on you whether it will
be fixed (if you won't fix this issue, feel free to close this bug).  List of
all defects is attached.

Quality engineering:
  This issue was found by static analysis tool and we can't provide any
  reproducer for this.  We will verify the fix once available.  Please check
  these tests as SanityOnly (just check that patches for the issues and nothing
  unexpected is added by the commit).  If you want to check the new package
  with Coverity yourself, feel free to use covscan tool
  (https://engineering.redhat.com/trac/CoverityScan/wiki/covscan).

Pavel

Comment 1 RHEL Program Management 2012-08-22 08:58:15 UTC
This request was evaluated by Red Hat Product Management for inclusion
in a Red Hat Enterprise Linux release.  Product Management has
requested further review of this request by Red Hat Engineering, for
potential inclusion in a Red Hat Enterprise Linux release for currently
deployed products.  This request is not yet committed for inclusion in
a release.

Comment 2 Jakub Hrozek 2012-08-22 09:36:03 UTC
This bug was already fixed upstream in 158aff60c94aa72a925b766fb33c4117a959970b

It is a one-liner that sets the pointer to NULL to avoid trying to free random memory.

Comment 6 Amith 2012-09-05 13:24:37 UTC
Verified on sssd-1.5.1-58.el5.
This bug has been verified sanity only and no related regressions detected.

Comment 8 errata-xmlrpc 2013-01-08 07:24:35 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2013-0047.html