Hi,
Please find the latest report on new defect(s) introduced to alfred found with Coverity Scan.
1 new defect(s) introduced to alfred found with Coverity Scan.
New defect(s) Reported-by: Coverity Scan Showing 1 of 1 defect(s)
** CID 155886: Security best practices violations (STRING_OVERFLOW) /util.c: 95 in ipv4_arp_request()
________________________________________________________________________________________________________ *** CID 155886: Security best practices violations (STRING_OVERFLOW) /util.c: 95 in ipv4_arp_request() 89 memset(mac, 0, ETH_ALEN); 90 91 sin = (struct sockaddr_in *)&arpreq.arp_pa; 92 sin->sin_family = AF_INET; 93 sin->sin_addr.s_addr = addr->ipv4.s_addr; 94
CID 155886: Security best practices violations (STRING_OVERFLOW) Note: This defect has an elevated risk because the source argument is a parameter of the current function.
95 strcpy(arpreq.arp_dev, interface->interface); 96 if (ioctl(interface->netsock, SIOCGARP, &arpreq) < 0) 97 return -1; 98 99 if (arpreq.arp_flags & ATF_COM) { 100 memcpy(mac, arpreq.arp_ha.sa_data, sizeof(*mac));
________________________________________________________________________________________________________ To view the defects in Coverity Scan visit, https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05...
To manage Coverity Scan email notifications for "linux-merge@lists.open-mesh.org", click https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05...