Le 24/07/2017 à 20:27, Philippe Mathieu-Daudé a écrit :
> linux-user/syscall.c:9860:17: warning: Call to function 'strcpy' is insecure
> as it does not provide bounding of the memory buffer. Replace unbounded copy
> functions with analogous functions that support length arguments such as
> 'strlcpy'. CWE-119
> strcpy (buf->machine, cpu_to_uname_machine(cpu_env));
> ^~~~~~
>
> Reported-by: Clang Static Analyzer
> Signed-off-by: Philippe Mathieu-Daudé <f4...@amsat.org>
> ---
> linux-user/syscall.c | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
> diff --git a/linux-user/syscall.c b/linux-user/syscall.c
> index 963b9c8f4b..847f729834 100644
> --- a/linux-user/syscall.c
> +++ b/linux-user/syscall.c
> @@ -9853,7 +9853,8 @@ abi_long do_syscall(void *cpu_env, int num, abi_long
> arg1,
> if (!is_error(ret)) {
> /* Overwrite the native machine name with whatever is being
> emulated. */
> - strcpy (buf->machine, cpu_to_uname_machine(cpu_env));
> + g_strlcpy(buf->machine, cpu_to_uname_machine(cpu_env),
> + sizeof(buf->machine));
> /* Allow the user to override the reported release. */
> if (qemu_uname_release && *qemu_uname_release) {
> g_strlcpy(buf->release, qemu_uname_release,
>
We should not have a problem here as cpu_to_uname_machine() is "const
char *" and the string is defined inside QEMU (so it should fit into
machine[]).
Reviewed-by: Laurent Vivier <laur...@vivier.eu>