Coverity TAINTED_SCALAR - CID 12542 - plugins/inotify/src/inotify.cpp - in function: InotifyScreen::processEvents() - Calling function "read(int, void *, size_t)" taints argument "buf".

Bug #1101524 reported by Product Strategy Coverity Bug Uploader on 2013-01-18
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Compiz
Medium
Unassigned
0.9.9
Medium
Unassigned

Bug Description

This bug is exported from the Coverity Integration Manager on Canonical's servers. For information on how this is done please see this website: https://wiki.ubuntu.com/CanonicalProductStrategy/Coverity
CID: 12542
Checker: TAINTED_SCALAR
Category: array_index_read
CWE definition: http://cwe.mitre.org/data/definitions/20.html
File: /tmp/buildd/compiz-0.9.9~daily13.01.14/plugins/inotify/src/inotify.cpp
Function: InotifyScreen::processEvents()
Code snippet:
 70 {
 71 char buf[256 * (sizeof (struct inotify_event) + 16)];
 72 int len;
 73
CID 12542 - TAINTED_SCALAR
Calling function "read(int, void *, size_t)" taints argument "buf".
 74 len = read (fd, buf, sizeof (buf));
 75 if (len < 0)
 76 {
 77 perror ("read");
 78 }
 79 else

MC Return (mc-return) on 2013-07-06
summary: - Coverity TAINTED_SCALAR - CID 12542
+ Coverity TAINTED_SCALAR - CID 12542 - plugins/inotify/src/inotify.cpp -
+ in function: InotifyScreen::processEvents() - Calling function
+ "read(int, void *, size_t)" taints argument "buf".
Changed in compiz:
milestone: none → 0.9.10.0
Changed in compiz:
milestone: 0.9.10.0 → 0.9.10.2
MC Return (mc-return) on 2013-07-24
Changed in compiz:
milestone: 0.9.10.2 → 0.9.11.0
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers