https://bugs.linaro.org/show_bug.cgi?id=2424

            Bug ID: 2424
           Summary: CID 164655:  Security best practices violations
                    pktio/ipc.c:
           Product: OpenDataPlane - linux- generic reference
           Version: v1.10
          Hardware: Other
                OS: Linux
            Status: UNCONFIRMED
          Severity: enhancement
          Priority: ---
         Component: Packet IO
          Assignee: [email protected]
          Reporter: [email protected]
                CC: [email protected]
  Target Milestone: ---

*** CID 164655:  Security best practices violations  (STRING_OVERFLOW)
/platform/linux-generic/pktio/ipc.c: 214 in _ipc_init_master()
208                     ipc_shm_name, _ring_count(pktio_entry->s.ipc.rx.free),
209                     _ring_free_count(pktio_entry->s.ipc.rx.free));
210
211             /* Set up pool name for remote info */
212             pinfo = pktio_entry->s.ipc.pinfo;
213             pool_name = _ipc_odp_buffer_pool_shm_name(pool);
>>>     CID 164655:  Security best practices violations  (STRING_OVERFLOW)
>>>     You might overrun the 32-character fixed-size string 
>>> "pinfo->master.pool_name" by copying "pool_name" without checking the 
>>> length.
214             memcpy(pinfo->master.pool_name, pool_name, strlen(pool_name));
215             pinfo->master.shm_pkt_pool_size = pool_entry->s.pool_size;
216             pinfo->master.shm_pool_bufs_num = pool_entry->s.buf_num;
217             pinfo->master.shm_pkt_size = pool_entry->s.seg_size;
218             pinfo->master.mdata_offset =  pool_entry->s.pool_mdata_addr -
219                                    pool_entry->s.pool_base_addr;

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Reply via email to