-
Notifications
You must be signed in to change notification settings - Fork 322
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
rimage: strcpy possible buffer overflow #257
Comments
@plbossart i will thake #257 and #258. |
still an issue as of November 2... |
@plbossart
|
@plbossart Please verify with #646. |
I wonder why tool complained just about 1 line, but it's wrong in 2 places, also here: Line 191 in 4bd543c
|
@plbossart Could you rescan the project to make sure all the issues are gone? |
Task is assigned to @xiulipan, He will do next scan. |
@plbossart @tlauda @plbossart |
@jajanusz |
This code in pkcs1_5.c is flagged by Coverity as problematic
CID 313456 (#1 of 1): Copy into fixed size buffer (STRING_OVERFLOW)
3. fixed_size_dest: You might overrun the 256-character fixed-size string path by copying image->key_name without checking the length.
4. parameter_as_source: Note: This defect has an elevated risk because the source argument is a parameter of the current function
The text was updated successfully, but these errors were encountered: