Coverity TAINTED_SCALAR - CID 12542 - plugins/inotify/src/inotify.cpp - in function: InotifyScreen::processEvents() - Calling function "read(int, void *, size_t)" taints argument "buf".
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Compiz |
New
|
Medium
|
Unassigned | ||
0.9.9 |
New
|
Medium
|
Unassigned |
Bug Description
This bug is exported from the Coverity Integration Manager on Canonical's servers. For information on how this is done please see this website: https:/
CID: 12542
Checker: TAINTED_SCALAR
Category: array_index_read
CWE definition: http://
File: /tmp/buildd/
Function: InotifyScreen:
Code snippet:
70 {
71 char buf[256 * (sizeof (struct inotify_event) + 16)];
72 int len;
73
CID 12542 - TAINTED_SCALAR
Calling function "read(int, void *, size_t)" taints argument "buf".
74 len = read (fd, buf, sizeof (buf));
75 if (len < 0)
76 {
77 perror ("read");
78 }
79 else
summary: |
- Coverity TAINTED_SCALAR - CID 12542 + Coverity TAINTED_SCALAR - CID 12542 - plugins/inotify/src/inotify.cpp - + in function: InotifyScreen::processEvents() - Calling function + "read(int, void *, size_t)" taints argument "buf". |
Changed in compiz: | |
milestone: | none → 0.9.10.0 |
Changed in compiz: | |
milestone: | 0.9.10.0 → 0.9.10.2 |
Changed in compiz: | |
milestone: | 0.9.10.2 → 0.9.11.0 |
Source file with Coverity annotations.