Hi,
Please find the latest report on new defect(s) introduced to ceph found with
Coverity Scan.
1 new defect(s) introduced to ceph found with Coverity Scan.
New defect(s) Reported-by: Coverity Scan
Showing 1 of 1 defect(s)
** CID 1255369: Copy into fixed size buffer (STRING_OVERFLOW)
/common/blkdev.cc: 34 in block_device_support_discard(const char *)()
________________________________________________________________________________________________________
*** CID 1255369: Copy into fixed size buffer (STRING_OVERFLOW)
/common/blkdev.cc: 34 in block_device_support_discard(const char *)()
28 bool block_device_support_discard(const char *devname)
29 {
30 bool can_trim = false;
31 char *p = strstr((char *)devname, "sd");
32 char name[32] = {0};
33
>>> CID 1255369: Copy into fixed size buffer (STRING_OVERFLOW)
>>> You might overrun the 32 byte fixed-size string "name" by copying "p"
>>> without checking the length.
34 strcpy(name, p);
35 for (unsigned int i = 0; i < strlen(name); i++) {
36 if(isdigit(name[i])) {
37 name[i] = 0;
38 break;
39 }
________________________________________________________________________________________________________
To view the defects in Coverity Scan visit,
http://scan.coverity.com/projects/25?tab=overview
To unsubscribe from the email notification for new defects,
http://scan5.coverity.com/cgi-bin/unsubscribe.py
--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html