Fixed findings

List of Findings

Error: GCC_ANALYZER_WARNING (CWE-688): [#def1]
krb5-1.21.3/src/kdc/rtest.c:88:5: warning[-Wanalyzer-null-argument]: use of NULL ‘ntrans.data’ where non-null expected
krb5-1.21.3/src/kdc/rtest.c:67:8: branch_false: following ‘false’ branch (when ‘argc > 3’)...
krb5-1.21.3/src/kdc/rtest.c:74:12: branch_false: ...to here
krb5-1.21.3/src/kdc/rtest.c:75:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/kdc/rtest.c:80:5: branch_false: ...to here
krb5-1.21.3/src/kdc/rtest.c:81:5: release_memory: ‘ntrans.data’ is NULL
krb5-1.21.3/src/kdc/rtest.c:84:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/kdc/rtest.c:84:8: branch_false: ...to here
krb5-1.21.3/src/kdc/rtest.c:88:12: release_memory: ‘ntrans.data’ is NULL
krb5-1.21.3/src/kdc/rtest.c:88:5: danger: argument 1 (‘otrans.data’) NULL where non-null expected
#   86|       else
#   87|           otrans.data = 0;
#   88|->     memcpy(otrans.data,argv[1], otrans.length);
#   89|   
#   90|       tgs = make_princ(ctx, argv[2], argv[0]);

Error: COMPILER_WARNING (CWE-704): [#def2]
krb5-1.21.3/src/lib/krb5/ccache/ccbase.c: scope_hint: In function ‘krb5_cc_resolve’
krb5-1.21.3/src/lib/krb5/ccache/ccbase.c:213:8: warning[-Wdiscarded-qualifiers]: assignment discards ‘const’ qualifier from pointer target type
#  213 |     cp = strchr (name, ':');
#      |        ^
#  211|           return KRB5_CC_BADNAME;
#  212|       pfx = NULL;
#  213|->     cp = strchr (name, ':');
#  214|       if (!cp) {
#  215|           if (krb5_cc_dfl_ops)

Error: COMPILER_WARNING (CWE-704): [#def3]
krb5-1.21.3/src/lib/krb5/ccache/ccbase.c:213:8: warning[-Wdiscarded-qualifiers]: assignment discards ‘const’ qualifier from pointer target type
#  211|           return KRB5_CC_BADNAME;
#  212|       pfx = NULL;
#  213|->     cp = strchr (name, ':');
#  214|       if (!cp) {
#  215|           if (krb5_cc_dfl_ops)

Error: GCC_ANALYZER_WARNING (CWE-401): [#def4]
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:142:18: warning[-Wanalyzer-malloc-leak]: leak of ‘rhost’
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:39:1: enter_function: entry to ‘krb5_fwd_tgt_creds’
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:61:8: branch_true: following ‘true’ branch (when ‘cc’ is NULL)...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:62:23: branch_true: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:62:12: branch_false: following ‘false’ branch...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:64:9: branch_false: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:67:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:69:9: branch_false: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:69:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:73:15: branch_false: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:73:15: branch_false: following ‘false’ branch (when ‘server’ is NULL)...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:96:19: branch_false: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:96:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:99:55: branch_false: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:101:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:105:5: branch_false: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:109:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:113:54: branch_false: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:113:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:118:10: branch_false: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:118:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:123:9: branch_false: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:123:8: branch_true: following ‘true’ branch...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:124:12: branch_true: following ‘true’ branch (when ‘rhost’ is NULL)...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:125:17: branch_true: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:125:16: branch_false: following ‘false’ branch...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:130:17: branch_false: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:130:16: branch_false: following ‘false’ branch...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:135:57: branch_false: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:135:25: call_function: calling ‘k5memdup0’ from ‘krb5_fwd_tgt_creds’
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:135:25: return_function: returning to ‘krb5_fwd_tgt_creds’ from ‘k5memdup0’
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:137:16: branch_false: following ‘false’ branch...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:142:18: branch_false: ...to here
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:142:18: throw: if ‘k5_os_hostaddr’ throws an exception...
krb5-1.21.3/src/lib/krb5/krb/fwd_tgt.c:142:18: danger: ‘rhost’ leaks here; was allocated at [(35)](sarif:/runs/0/results/0/codeFlows/0/threadFlows/0/locations/34)
#  140|           }
#  141|   
#  142|->         retval = k5_os_hostaddr(context, rhost, &addrs);
#  143|           if (retval)
#  144|               goto errout;

Error: COMPILER_WARNING (CWE-704): [#def5]
krb5-1.21.3/src/lib/krb5/os/expand_path.c: scope_hint: In function ‘k5_expand_path_tokens_extra’
krb5-1.21.3/src/lib/krb5/os/expand_path.c:495:19: warning[-Wdiscarded-qualifiers]: assignment discards ‘const’ qualifier from pointer target type
#  495 |         tok_begin = strstr(path_left, "%{");
#      |                   ^
#  493|           /* Find the next token in path_left and add the literal text up to it.
#  494|            * If there are no more tokens, we can finish up. */
#  495|->         tok_begin = strstr(path_left, "%{");
#  496|           if (tok_begin == NULL) {
#  497|               k5_buf_add(&buf, path_left);

Error: COMPILER_WARNING (CWE-704): [#def6]
krb5-1.21.3/src/lib/krb5/os/expand_path.c:495:19: warning[-Wdiscarded-qualifiers]: assignment discards ‘const’ qualifier from pointer target type
#  493|           /* Find the next token in path_left and add the literal text up to it.
#  494|            * If there are no more tokens, we can finish up. */
#  495|->         tok_begin = strstr(path_left, "%{");
#  496|           if (tok_begin == NULL) {
#  497|               k5_buf_add(&buf, path_left);

Error: COMPILER_WARNING (CWE-704): [#def7]
krb5-1.21.3/src/lib/krb5/os/locate_kdc.c: scope_hint: In function ‘parse_uri_if_https’
krb5-1.21.3/src/lib/krb5/os/locate_kdc.c:200:12: warning[-Wdiscarded-qualifiers]: assignment discards ‘const’ qualifier from pointer target type
#  200 |         cp = strchr(*host, '/');
#      |            ^
#  198|           *host = host_or_uri + 8;
#  199|   
#  200|->         cp = strchr(*host, '/');
#  201|           if (cp != NULL) {
#  202|               *cp = '\0';

Error: COMPILER_WARNING (CWE-704): [#def8]
krb5-1.21.3/src/lib/krb5/os/locate_kdc.c:200:12: warning[-Wdiscarded-qualifiers]: assignment discards ‘const’ qualifier from pointer target type
#  198|           *host = host_or_uri + 8;
#  199|   
#  200|->         cp = strchr(*host, '/');
#  201|           if (cp != NULL) {
#  202|               *cp = '\0';

Error: GCC_ANALYZER_WARNING (CWE-401): [#def9]
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:216:14: warning[-Wanalyzer-malloc-leak]: leak of ‘self’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:564:1: enter_function: entry to ‘otp_state_new’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:573:8: branch_false: following ‘false’ branch (when ‘retval == 0’)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:576:12: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:576:12: acquire_memory: allocated here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:577:8: branch_false: following ‘false’ branch (when ‘self’ is non-NULL)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:580:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:581:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: call_function: calling ‘token_types_decode’ from ‘otp_state_new’
#  214|   
#  215|       /* Get the secret (optional for Unix-domain sockets). */
#  216|->     retval = profile_get_string(profile, "otp", name, "secret", NULL, &pstr);
#  217|       if (retval != 0)
#  218|           goto cleanup;

Error: GCC_ANALYZER_WARNING (CWE-401): [#def10]
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:216:14: warning[-Wanalyzer-malloc-leak]: leak of ‘server’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:564:1: enter_function: entry to ‘otp_state_new’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:573:8: branch_false: following ‘false’ branch (when ‘retval == 0’)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:576:12: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:577:8: branch_false: following ‘false’ branch (when ‘self’ is non-NULL)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:580:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:581:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: call_function: calling ‘token_types_decode’ from ‘otp_state_new’
#  214|   
#  215|       /* Get the secret (optional for Unix-domain sockets). */
#  216|->     retval = profile_get_string(profile, "otp", name, "secret", NULL, &pstr);
#  217|       if (retval != 0)
#  218|           goto cleanup;

Error: GCC_ANALYZER_WARNING (CWE-401): [#def11]
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:221:9: warning[-Wanalyzer-malloc-leak]: leak of ‘name_copy’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:564:1: enter_function: entry to ‘otp_state_new’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:573:8: branch_false: following ‘false’ branch (when ‘retval == 0’)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:576:12: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:577:8: branch_false: following ‘false’ branch (when ‘self’ is non-NULL)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:580:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:581:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: call_function: calling ‘token_types_decode’ from ‘otp_state_new’
#  219|       if (pstr != NULL) {
#  220|           retval = read_secret_file(pstr, &secret);
#  221|->         profile_release_string(pstr);
#  222|           if (retval != 0)
#  223|               goto cleanup;

Error: GCC_ANALYZER_WARNING (CWE-401): [#def12]
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:221:9: warning[-Wanalyzer-malloc-leak]: leak of ‘secret’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:564:1: enter_function: entry to ‘otp_state_new’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:573:8: branch_false: following ‘false’ branch (when ‘retval == 0’)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:576:12: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:577:8: branch_false: following ‘false’ branch (when ‘self’ is non-NULL)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:580:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:581:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: call_function: calling ‘token_types_decode’ from ‘otp_state_new’
#  219|       if (pstr != NULL) {
#  220|           retval = read_secret_file(pstr, &secret);
#  221|->         profile_release_string(pstr);
#  222|           if (retval != 0)
#  223|               goto cleanup;

Error: GCC_ANALYZER_WARNING (CWE-401): [#def13]
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:226:13: warning[-Wanalyzer-malloc-leak]: leak of ‘name_copy’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:564:1: enter_function: entry to ‘otp_state_new’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:573:8: branch_false: following ‘false’ branch (when ‘retval == 0’)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:576:12: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:577:8: branch_false: following ‘false’ branch (when ‘self’ is non-NULL)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:580:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:581:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: call_function: calling ‘token_types_decode’ from ‘otp_state_new’
#  224|       } else {
#  225|           if (server[0] != '/') {
#  226|->             com_err("otp", EINVAL, "Secret missing (token type '%s')", name);
#  227|               retval = EINVAL;
#  228|               goto cleanup;

Error: GCC_ANALYZER_WARNING (CWE-401): [#def14]
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:226:13: warning[-Wanalyzer-malloc-leak]: leak of ‘server’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:564:1: enter_function: entry to ‘otp_state_new’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:573:8: branch_false: following ‘false’ branch (when ‘retval == 0’)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:576:12: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:577:8: branch_false: following ‘false’ branch (when ‘self’ is non-NULL)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:580:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:581:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: call_function: calling ‘token_types_decode’ from ‘otp_state_new’
#  224|       } else {
#  225|           if (server[0] != '/') {
#  226|->             com_err("otp", EINVAL, "Secret missing (token type '%s')", name);
#  227|               retval = EINVAL;
#  228|               goto cleanup;

Error: GCC_ANALYZER_WARNING (CWE-401): [#def15]
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:240:14: warning[-Wanalyzer-malloc-leak]: leak of ‘server’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:564:1: enter_function: entry to ‘otp_state_new’
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:573:8: branch_false: following ‘false’ branch (when ‘retval == 0’)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:576:12: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:577:8: branch_false: following ‘false’ branch (when ‘self’ is non-NULL)...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:580:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:581:8: branch_false: following ‘false’ branch...
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: branch_false: ...to here
krb5-1.21.3/src/plugins/preauth/otp/otp_state.c:584:14: call_function: calling ‘token_types_decode’ from ‘otp_state_new’
#  238|   
#  239|       /* Get the timeout (profile value in seconds, result in milliseconds). */
#  240|->     retval = profile_get_integer(profile, "otp", name, "timeout",
#  241|                                    DEFAULT_TIMEOUT, &timeout);
#  242|       if (retval != 0)

Error: COMPILER_WARNING (CWE-704): [#def16]
krb5-1.21.3/src/plugins/preauth/pkinit/pkinit_identity.c: scope_hint: In function ‘process_option_ca_crl’
krb5-1.21.3/src/plugins/preauth/pkinit/pkinit_identity.c:483:14: warning[-Wdiscarded-qualifiers]: assignment discards ‘const’ qualifier from pointer target type
#  483 |     residual = strchr(value, ':');
#      |              ^
#  481|       pkiDebug("%s: processing catype %s, value '%s'\n",
#  482|                __FUNCTION__, catype2string(catype), value);
#  483|->     residual = strchr(value, ':');
#  484|       if (residual == NULL) {
#  485|           pkiDebug("No type given for '%s'\n", value);

Error: COMPILER_WARNING (CWE-704): [#def17]
krb5-1.21.3/src/plugins/preauth/pkinit/pkinit_identity.c:483:14: warning[-Wdiscarded-qualifiers]: assignment discards ‘const’ qualifier from pointer target type
#  481|       pkiDebug("%s: processing catype %s, value '%s'\n",
#  482|                __FUNCTION__, catype2string(catype), value);
#  483|->     residual = strchr(value, ':');
#  484|       if (residual == NULL) {
#  485|           pkiDebug("No type given for '%s'\n", value);

Error: COMPILER_WARNING (CWE-704): [#def18]
krb5-1.21.3/src/plugins/preauth/pkinit/pkinit_matching.c: scope_hint: In function ‘parse_rule_component’
krb5-1.21.3/src/plugins/preauth/pkinit/pkinit_matching.c:304:8: warning[-Wdiscarded-qualifiers]: assignment discards ‘const’ qualifier from pointer target type
#  304 |     nk = strchr(*rule, '<');
#      |        ^
#  302|        * beginning of the next keyword (or the end of the rule).
#  303|        */
#  304|->     nk = strchr(*rule, '<');
#  305|       while (nk != NULL) {
#  306|           /* Possibly another keyword, check it out */

Error: COMPILER_WARNING (CWE-704): [#def19]
krb5-1.21.3/src/plugins/preauth/pkinit/pkinit_matching.c:304:8: warning[-Wdiscarded-qualifiers]: assignment discards ‘const’ qualifier from pointer target type
#  302|        * beginning of the next keyword (or the end of the rule).
#  303|        */
#  304|->     nk = strchr(*rule, '<');
#  305|       while (nk != NULL) {
#  306|           /* Possibly another keyword, check it out */

Scan Properties

analyzer-version-clippy1.92.0
analyzer-version-cppcheck2.19.1
analyzer-version-gcc16.0.0
analyzer-version-gcc-analyzer16.0.0
analyzer-version-shellcheck0.11.0
analyzer-version-unicontrol0.0.2
diffbase-analyzer-version-clippy1.92.0
diffbase-analyzer-version-cppcheck2.19.1
diffbase-analyzer-version-gcc16.0.0
diffbase-analyzer-version-gcc-analyzer16.0.0
diffbase-analyzer-version-shellcheck0.11.0
diffbase-analyzer-version-unicontrol0.0.2
diffbase-enabled-pluginsclippy, cppcheck, gcc, shellcheck, unicontrol
diffbase-exit-code0
diffbase-hostip-172-16-1-26.us-west-2.compute.internal
diffbase-known-false-positives/usr/share/csmock/known-false-positives.js
diffbase-known-false-positives-rpmknown-false-positives-0.0.0.20250521.132812.g8eff701.main-1.el9.noarch
diffbase-mock-configfedora-rawhide-x86_64
diffbase-project-namekrb5-1.21.3-11.fc44
diffbase-store-results-to/tmp/tmp4x9x5gxl/krb5-1.21.3-11.fc44.tar.xz
diffbase-time-created2026-01-08 18:24:40
diffbase-time-finished2026-01-08 18:30:32
diffbase-toolcsmock
diffbase-tool-args'/usr/bin/csmock' '-r' 'fedora-rawhide-x86_64' '-t' 'gcc,cppcheck,clippy,shellcheck,unicontrol' '-o' '/tmp/tmp4x9x5gxl/krb5-1.21.3-11.fc44.tar.xz' '--gcc-analyze' '--unicontrol-notests' '--unicontrol-bidi-only' '--install' 'pam' '--gcc-analyzer-bin=/usr/bin/gcc' '/tmp/tmp4x9x5gxl/krb5-1.21.3-11.fc44.src.rpm'
diffbase-tool-versioncsmock-3.8.3.20251215.161544.g62de9a5-1.el9
enabled-pluginsclippy, cppcheck, gcc, shellcheck, unicontrol
exit-code0
hostip-172-16-1-26.us-west-2.compute.internal
known-false-positives/usr/share/csmock/known-false-positives.js
known-false-positives-rpmknown-false-positives-0.0.0.20250521.132812.g8eff701.main-1.el9.noarch
mock-configfedora-rawhide-x86_64
project-namekrb5-1.21.3-7.fc43
store-results-to/tmp/tmp2_gd08jv/krb5-1.21.3-7.fc43.tar.xz
time-created2026-01-08 18:17:08
time-finished2026-01-08 18:23:35
titleFixed findings
toolcsmock
tool-args'/usr/bin/csmock' '-r' 'fedora-rawhide-x86_64' '-t' 'gcc,cppcheck,clippy,shellcheck,unicontrol' '-o' '/tmp/tmp2_gd08jv/krb5-1.21.3-7.fc43.tar.xz' '--gcc-analyze' '--unicontrol-notests' '--unicontrol-bidi-only' '--install' 'pam' '--gcc-analyzer-bin=/usr/bin/gcc' '/tmp/tmp2_gd08jv/krb5-1.21.3-7.fc43.src.rpm'
tool-versioncsmock-3.8.3.20251215.161544.g62de9a5-1.el9