Hi,

Please find the latest report on new defect(s) introduced to ceph found with 
Coverity Scan.

1 new defect(s) introduced to ceph found with Coverity Scan.


New defect(s) Reported-by: Coverity Scan
Showing 1 of 1 defect(s)


** CID 1255369:  Copy into fixed size buffer  (STRING_OVERFLOW)
/common/blkdev.cc: 34 in block_device_support_discard(const char *)()


________________________________________________________________________________________________________
*** CID 1255369:  Copy into fixed size buffer  (STRING_OVERFLOW)
/common/blkdev.cc: 34 in block_device_support_discard(const char *)()
28     bool block_device_support_discard(const char *devname)
29     {
30       bool can_trim = false;
31       char *p = strstr((char *)devname, "sd");
32       char name[32] = {0};
33     
>>>     CID 1255369:  Copy into fixed size buffer  (STRING_OVERFLOW)
>>>     You might overrun the 32 byte fixed-size string "name" by copying "p" 
>>> without checking the length.
34       strcpy(name, p);
35       for (unsigned int i = 0; i < strlen(name); i++) {
36         if(isdigit(name[i])) {
37           name[i] = 0;
38           break;
39         }


________________________________________________________________________________________________________
To view the defects in Coverity Scan visit, 
http://scan.coverity.com/projects/25?tab=overview

To unsubscribe from the email notification for new defects, 
http://scan5.coverity.com/cgi-bin/unsubscribe.py



--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to