X-Spam-Status: No, score=1.7 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_BL_SPAMCOP_NET,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,RCVD_IN_SORBS_SPAM, RP_MATCHES_RCVD autolearn=no autolearn_force=no version=3.4.1 From: scan-admin@coverity.com X-Original-To: dhcp-confidential@bugs.isc.org X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mx.pao1.isc.org Date: Thu, 26 Oct 2017 22:14:13 +0000 (UTC) X-SG-Eid: 2eNb/oJaV+midMo60UXY3uapH4g3wH1uQjxDu4kT0liHabS1S+fNt6s5+K4M5aTzgs3qca24gZDLjr sbh09did80sQVe0niIQV6Nj5e0wIbp8Sr3JPgTXuhsWPYXjJOGvKDmUHPv+S8i+pnSxGg9KuQIc8uf JFZQLLs8U4Tt0NqjEkDIAMQCzZcNQAFnHZPdEWqDlxuAx0euCBciqH7P5w== Dkim-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=sendgrid.net; h=from:to:subject:mime-version:content-type:content-transfer-encoding; s=smtpapi; bh=hn7TQYzguerJVa6BJotZDfrvwpw=; b=He6uN2Je/DrepNcS9b gQ1KRpIWjOVhRuUd+A09OHqs0R0tkUNYyTR7XYk2eSzWPdxFxGE7NZ3aZZ0IcWJp CQXJcKbdvETsP3jWkIPqZi+HVx2XiBxGGjxmPteDTlt63hEW3Fds/DGSQe8i/AUn h232BLMjQVyxa4xK0ZMHHZVJA= Received: from mx.pao1.isc.org (mx.pao1.isc.org [149.20.64.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx.pao1.isc.org", Issuer "COMODO RSA Organization Validation Secure Server CA" (not verified)) by bugs.isc.org (Postfix) with ESMTPS id CBCA9D78B0A for ; Thu, 26 Oct 2017 22:14:16 +0000 (UTC) Received: from o2.hv1nn.shared.sendgrid.net (o2.hv1nn.shared.sendgrid.net [167.89.100.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.pao1.isc.org (Postfix) with ESMTPS id 9F4C83AB4F3 for ; Thu, 26 Oct 2017 22:14:14 +0000 (UTC) Received: by filter0016p3las1.sendgrid.net with SMTP id filter0016p3las1-26943-59F25E34-15 2017-10-26 22:14:12.406228372 +0000 UTC Received: from coverity.com (static-208.69.177.245.nephosdns.com [208.69.177.245]) by ismtpd0010p1sjc2.sendgrid.net (SG) with ESMTP id wPC1S_DcRpuoYM9uz6VK-w for ; Thu, 26 Oct 2017 22:14:12.365 +0000 (UTC) content-type: text/plain; charset="utf-8" Subject: New Defects reported by Coverity Scan for ISC-DHCP To: dhcp-bugs@isc.org From bounces+2389337-f8ef-dhcp-bugs=isc.org@sendgrid.net Thu Oct 26 22:14:16 2017 Content-Transfer-Encoding: 7bit MIME-Version: 1.0 X-Spam-Level: * Return-Path: Delivered-To: dhcp-confidential@bugs.isc.org X-RT-Incoming-Encryption: Not encrypted Message-ID: <59f25e3425dba_376440932c353b1@ss1435.mail> X-RT-Original-Encoding: utf-8 X-RT-Interface: Email Content-Length: 3048 Hi, Please find the latest report on new defect(s) introduced to ISC-DHCP found with Coverity Scan. 2 new defect(s) introduced to ISC-DHCP found with Coverity Scan. New defect(s) Reported-by: Coverity Scan Showing 2 of 2 defect(s) ** CID 1420320: Resource leaks (RESOURCE_LEAK) /bind/bind-9.11.2/lib/dns/rbtdb.c: 7492 in deserialize32() ________________________________________________________________________________________________________ *** CID 1420320: Resource leaks (RESOURCE_LEAK) /bind/bind-9.11.2/lib/dns/rbtdb.c: 7492 in deserialize32() 7486 if (base == NULL || base == MAP_FAILED) { 7487 return (ISC_R_FAILURE); 7488 } 7489 7490 header = (rbtdb_file_header_t *)(base + offset); 7491 if (!match_header_version(header)) { >>> CID 1420320: Resource leaks (RESOURCE_LEAK) >>> Variable "header" going out of scope leaks the storage it points to. 7492 return (ISC_R_FAILURE); 7493 } 7494 7495 if (header->tree != 0) { 7496 result = dns_rbt_deserialize_tree(base, filesize, 7497 (off_t) header->tree, ** CID 1420319: Resource leaks (RESOURCE_LEAK) /bind/bind-9.11.2/lib/dns/rbtdb.c: 7492 in deserialize64() ________________________________________________________________________________________________________ *** CID 1420319: Resource leaks (RESOURCE_LEAK) /bind/bind-9.11.2/lib/dns/rbtdb.c: 7492 in deserialize64() 7486 if (base == NULL || base == MAP_FAILED) { 7487 return (ISC_R_FAILURE); 7488 } 7489 7490 header = (rbtdb_file_header_t *)(base + offset); 7491 if (!match_header_version(header)) { >>> CID 1420319: Resource leaks (RESOURCE_LEAK) >>> Variable "header" going out of scope leaks the storage it points to. 7492 return (ISC_R_FAILURE); 7493 } 7494 7495 if (header->tree != 0) { 7496 result = dns_rbt_deserialize_tree(base, filesize, 7497 (off_t) header->tree, ________________________________________________________________________________________________________ To view the defects in Coverity Scan visit, https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRab6kucGE8G6mRE1FKR2Ag87FjH5D5EKomg9SJ1sIkWFA-3D-3D_XFX-2BxtADztfMDcW4r2GH7E6TGVT4PiaTwnwuQkVMpYoErefOEFV1x2XIAj8qFMQl3-2Fv6mhzCBTs0XO53H1Zn9jvnIpMcMPjFljygf7T-2BUdAuy1mkB0ENzzNr13JZbmpGOf8so9V2GLpnurJW-2FIJL9EZZ-2BdRy563-2F8THsNinpv-2F7AN3RIbb2jzXXsI7ZyHgnmXfiYUH1Z5chHT8qju4obPg-3D-3D To manage Coverity Scan email notifications for "dhcp-bugs@isc.org", click https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRbVDbis712qZDP-2FA8y06Nq4VSUMfbZdfDe692MqhPm-2FjBlgt0jMCazKWgh17L1-2BKT8-2FRVwhIiDkSLwzkWTXmM-2F9gyMcfjzFAlSj57xJcTpCQFePWpS-2BYrfumELiSWoXoLY-3D_XFX-2BxtADztfMDcW4r2GH7E6TGVT4PiaTwnwuQkVMpYoErefOEFV1x2XIAj8qFMQlJsqPKZ5fPe4WPy2QJPTeJpEfdEx0FE2-2FGIpgEnVUhn-2BL-2BHZ42oIM0mQn4ODD8I7LP696Ym3vbsT89Y0GBrrwMTH0F4xix-2Fm2cG6ZQW4DlQGu2Uv0a4-2FlHgreeGuwHz58H45HaIdmCgckjF0yDEIBlg-3D-3D