Content-Transfer-Encoding: 7bit X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mx.pao1.isc.org Date: Tue, 12 Dec 2017 00:48:20 +0000 (UTC) X-Spam-Status: No, score=-0.0 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,RP_MATCHES_RCVD autolearn=unavailable autolearn_force=no version=3.4.1 X-RT-Incoming-Encryption: Not encrypted content-type: text/plain; charset="utf-8" X-Original-To: dhcp-confidential@bugs.isc.org Dkim-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=sendgrid.net; h=from:to:subject:mime-version:content-type:content-transfer-encoding; s=smtpapi; bh=p0ESSzT6d3fMH+kew9+6Mx4jLiU=; b=nzZuV8NeOu4wEjEo+l mAwthuEhGIcKp4FiMux9uR4j6AVoSOKWk4eB7egHvGDmZy+BBYCLpGcvIIjoChCS M6VG0CYmZG8XEcKumXwGt2OtvoSX7jHFxKTHqnyTJVERfdtmRO6sxL9citdDqp6A 6UN1FU3lWVo+o0NbS2hSfu5r4= Return-Path: From: scan-admin@coverity.com To: dhcp-bugs@isc.org MIME-Version: 1.0 X-SG-Eid: 2eNb/oJaV+midMo60UXY3uapH4g3wH1uQjxDu4kT0ljTV5Bcy0zSg8RDDxnNRwlHSDMPJhVDLdV3+q F0v/AQ6BGTEu/HFzPat7YV2QKLEMVNhSZCdOmwvYw5sQyb7zU6soCl9QSooXOR+2TCJs2h5i+yMpzO OF11pVz5u1U0LQPecvQeWF73UPVhtqoilbU7ScKhQ9rGSzX3qGYPmLHYTg== Subject: New Defects reported by Coverity Scan for ISC-DHCP Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx.pao1.isc.org", Issuer "COMODO RSA Organization Validation Secure Server CA" (not verified)) by bugs.isc.org (Postfix) with ESMTPS id 87A0BD78B0B for ; Tue, 12 Dec 2017 00:48:50 +0000 (UTC) Received: from o2.hv1nn.shared.sendgrid.net (o2.hv1nn.shared.sendgrid.net [167.89.100.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mx.pao1.isc.org (Postfix) with ESMTPS id 5E6E03B1AC7 for ; Tue, 12 Dec 2017 00:48:21 +0000 (UTC) Received: by filter0021p3las1.sendgrid.net with SMTP id filter0021p3las1-17341-5A2F2754-14 2017-12-12 00:48:20.302305683 +0000 UTC Received: from coverity.com (unknown [208.69.177.245]) by ismtpd0003p1sjc2.sendgrid.net (SG) with ESMTP id qLAF1iBxSfCYOL68q1jzvA for ; Tue, 12 Dec 2017 00:48:20.244 +0000 (UTC) Delivered-To: dhcp-confidential@bugs.isc.org Message-ID: <5a2f27543350c_3e443273282446e@ss1435.mail> From bounces+2389337-f8ef-dhcp-bugs=isc.org@sendgrid.net Tue Dec 12 00:48:50 2017 X-RT-Original-Encoding: utf-8 X-RT-Interface: Email Content-Length: 4321 Hi, Please find the latest report on new defect(s) introduced to ISC-DHCP found with Coverity Scan. 3 new defect(s) introduced to ISC-DHCP found with Coverity Scan. New defect(s) Reported-by: Coverity Scan Showing 3 of 3 defect(s) ** CID 1426059: Null pointer dereferences (REVERSE_INULL) /client/dhc6.c: 5146 in do_decline6() ________________________________________________________________________________________________________ *** CID 1426059: Null pointer dereferences (REVERSE_INULL) /client/dhc6.c: 5146 in do_decline6() 5140 5141 decline_done: 5142 /* We here because we've exhausted our retry limits or 5143 * something else has gone wrong with the decline process. 5144 * So let's just toss the existing lease and start over. 5145 */ >>> CID 1426059: Null pointer dereferences (REVERSE_INULL) >>> Null-checking "client->active_lease" suggests that it may be null, but it has already been dereferenced on all paths leading to the check. 5146 if (client->active_lease != NULL) { 5147 dhc6_lease_destroy(&client->active_lease, MDL); 5148 client->active_lease = NULL; 5149 } 5150 5151 start_init6(client); ** CID 1426058: Security best practices violations (STRING_OVERFLOW) /server/ddns.c: 1588 in ddns_fwd_srv_add3() ________________________________________________________________________________________________________ *** CID 1426058: Security best practices violations (STRING_OVERFLOW) /server/ddns.c: 1588 in ddns_fwd_srv_add3() 1582 #if defined (DEBUG_DNS_UPDATES) 1583 log_info ("DDNS: ddns_fwd_srv_add3: %s eresult: %d", 1584 dump_ddns_cb(ddns_cb), eresult); 1585 #endif 1586 1587 /* Construct a printable form of the address for logging */ >>> CID 1426058: Security best practices violations (STRING_OVERFLOW) >>> You might overrun the 46-character fixed-size string "ddns_address" by copying the return value of "piaddr" without checking the length. 1588 strcpy(ddns_address, piaddr(ddns_cb->address)); 1589 1590 switch(eresult) { 1591 case ISC_R_SUCCESS: 1592 log_info("Added new forward map from %.*s to %s", 1593 (int)ddns_cb->fwd_name.len, ** CID 1426057: Control flow issues (DEADCODE) /server/dhcpv6.c: 3297 in shorten_lifetimes() ________________________________________________________________________________________________________ *** CID 1426057: Control flow issues (DEADCODE) /server/dhcpv6.c: 3297 in shorten_lifetimes() 3291 /* shouldn't happen */ 3292 continue; 3293 } 3294 3295 /* If address matches (and for PDs the prefix len matches) 3296 * we assume this is our subopt, so update the lifetimes */ >>> CID 1426057: Control flow issues (DEADCODE) >>> Execution cannot reach the expression "oc->data.data[8] == lease->plen" inside this statement: "if (!memcmp(oc->data.data +...". 3297 if (!memcmp(oc->data.data + addr_offset, &lease->addr, 16) && 3298 (subopt_type != D6O_IA_PD || 3299 (oc->data.data[IASUBOPT_PD_PREFLEN_OFFSET] == 3300 lease->plen))) { 3301 u_int32_t pref_life = getULong(oc->data.data + 3302 pref_offset); ________________________________________________________________________________________________________ To view the defects in Coverity Scan visit, https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRab6kucGE8G6mRE1FKR2Ag87FjH5D5EKomg9SJ1sIkWFA-3D-3D_XFX-2BxtADztfMDcW4r2GH7E6TGVT4PiaTwnwuQkVMpYrncv2rcmU4rOCNLS9NuzXfZGkt4o2sutnxwz88J9-2BBp2mL9xwz6PIyP0MUSKiMoziqtS1c7S6GCDs45vXLIN4HtkhEtFEXdHxuuTMQow6wBUGRAdXdHsngYd2uxIXU0R5kWM6usUgIA1f79IdT1qeO9S1xwYP7NSrQgGAu3U-2BRWA-3D-3D To manage Coverity Scan email notifications for "dhcp-bugs@isc.org", click https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRbVDbis712qZDP-2FA8y06Nq4VSUMfbZdfDe692MqhPm-2FjBlgt0jMCazKWgh17L1-2BKT8-2FRVwhIiDkSLwzkWTXmM-2F9gyMcfjzFAlSj57xJcTpCQFePWpS-2BYrfumELiSWoXoLY-3D_XFX-2BxtADztfMDcW4r2GH7E6TGVT4PiaTwnwuQkVMpYrncv2rcmU4rOCNLS9NuzXfJ8MLdem39CSthES4jgbrqJM4KPwM5OfpJrSad4IAA0yQT7vEm9b0nXnU-2BtXoG5Y22hIlAlkcmsfQatLfBSxm7QWwE9aUb9pFKgXXR9p7PYPYk6shWpPX0EJx13FmeTuCEcUupgm5meADdBh9qKh3cw-3D-3D