https://bugs.linaro.org/show_bug.cgi?id=2424
Bug ID: 2424
Summary: CID 164655: Security best practices violations
pktio/ipc.c:
Product: OpenDataPlane - linux- generic reference
Version: v1.10
Hardware: Other
OS: Linux
Status: UNCONFIRMED
Severity: enhancement
Priority: ---
Component: Packet IO
Assignee: [email protected]
Reporter: [email protected]
CC: [email protected]
Target Milestone: ---
*** CID 164655: Security best practices violations (STRING_OVERFLOW)
/platform/linux-generic/pktio/ipc.c: 214 in _ipc_init_master()
208 ipc_shm_name, _ring_count(pktio_entry->s.ipc.rx.free),
209 _ring_free_count(pktio_entry->s.ipc.rx.free));
210
211 /* Set up pool name for remote info */
212 pinfo = pktio_entry->s.ipc.pinfo;
213 pool_name = _ipc_odp_buffer_pool_shm_name(pool);
>>> CID 164655: Security best practices violations (STRING_OVERFLOW)
>>> You might overrun the 32-character fixed-size string
>>> "pinfo->master.pool_name" by copying "pool_name" without checking the
>>> length.
214 memcpy(pinfo->master.pool_name, pool_name, strlen(pool_name));
215 pinfo->master.shm_pkt_pool_size = pool_entry->s.pool_size;
216 pinfo->master.shm_pool_bufs_num = pool_entry->s.buf_num;
217 pinfo->master.shm_pkt_size = pool_entry->s.seg_size;
218 pinfo->master.mdata_offset = pool_entry->s.pool_mdata_addr -
219 pool_entry->s.pool_base_addr;
--
You are receiving this mail because:
You are on the CC list for the bug.