Fix OpenNSL GPL bugs found by CoverityScan static analysis
Bug #1718388 reported by
Colin Ian King
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
High
|
Colin Ian King | ||
Xenial |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Static analysis on the ubuntu/opennsl drivers in Xenial have picked up various bugs. These need fixing.
Changed in linux (Ubuntu Xenial): | |
status: | New → Fix Committed |
tags: |
added: verification-done-xenial removed: verification-needed-xenial |
Changed in linux (Ubuntu): | |
status: | In Progress → Fix Released |
To post a comment you must log in.
[SRU Xenial]
== Justification ==
The ubuntu/opennsl drivers have various issues found by static analysis. These are potential null pointer deference bugs and array out-of-bounds reads. These need fixing.
== Test case ==
N/A. The fixes exercise untested corner cases the are potential issues.
== Regression potential ==
The fixes affect just the opennsl driver and are limited in scope. At most they will inhibit ioctl functionality (that is, abuse via an invalid ioctl).