[Gluster-devel] New Defects reported by Coverity Scan for gluster/glusterfs
scan-admin at coverity.com
scan-admin at coverity.com
Thu Mar 5 16:19:52 UTC 2015
Hi,
Please find the latest report on new defect(s) introduced to gluster/glusterfs found with Coverity Scan.
200 new defect(s) introduced to gluster/glusterfs found with Coverity Scan.
164 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.
New defect(s) Reported-by: Coverity Scan
Showing 20 of 200 defect(s)
** CID 1133995: Memory - illegal accesses (BUFFER_SIZE_WARNING)
/xlators/nfs/server/src/mount3.c: 516 in mnt3svc_update_mountlist()
________________________________________________________________________________________________________
*** CID 1133995: Memory - illegal accesses (BUFFER_SIZE_WARNING)
/xlators/nfs/server/src/mount3.c: 516 in mnt3svc_update_mountlist()
510 if (ret) {
511 gf_log (GF_MNT, GF_LOG_WARNING, "Failed to open '%s'",
512 nfs->rmtab);
513 goto free_err;
514 }
515
>>> CID 1133995: Memory - illegal accesses (BUFFER_SIZE_WARNING)
>>> Calling strncpy with a maximum size argument of 1024 bytes on destination array "me->exname" of size 1024 bytes might leave the destination string unterminated.
516 strncpy (me->exname, expname, MNTPATHLEN);
517
518 INIT_LIST_HEAD (&me->mlist);
519 /* Must get the IP or hostname of the client so we
520 * can map it into the mount entry.
521 */
________________________________________________________________________________________________________
To view the defects in Coverity Scan visit, https://scan.coverity.com/projects/987?tab=overview
To manage Coverity Scan email notifications for "gluster-devel at gluster.org", click https://scan.coverity.com/subscriptions/edit?email=gluster-devel%40gluster.org&token=7dffab14bc5a7180e75b0d047539f148 .
More information about the Gluster-devel
mailing list