mirror of
https://github.com/samba-team/samba.git
synced 2024-12-23 17:34:34 +03:00
3cb4073cd0
Found by Covscan. "Error: INTEGER_OVERFLOW (CWE-190): samba-4.20.0rc2/source4/dsdb/schema/schema_query.c:403: tainted_data_argument: The check ""i < new_len"" contains the tainted expression ""i"" which causes ""new_len"" to be considered tainted. samba-4.20.0rc2/source4/dsdb/schema/schema_query.c:407: overflow: The expression ""new_len - i"" is deemed underflowed because at least one of its arguments has underflowed. samba-4.20.0rc2/source4/dsdb/schema/schema_query.c:407: overflow: The expression ""(new_len - i) * 8UL"" is deemed underflowed because at least one of its arguments has underflowed. samba-4.20.0rc2/source4/dsdb/schema/schema_query.c:407: overflow_sink: ""(new_len - i) * 8UL"", which might have underflowed, is passed to ""memmove(val1, val2, (new_len - i) * 8UL)"". [Note: The source code implementation of the function has been overridden by a builtin model.] 405| const char **val2 = &attr_list[i]; 406| if (ldb_attr_cmp(*val1, *val2) == 0) { 407|-> memmove(val1, val2, (new_len - i) * sizeof( *attr_list)); 408| attr_list[new_len-1] = NULL; 409| new_len--;" Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Signed-off-by: Martin Schwenke <mschwenke@ddn.com> |
||
---|---|---|
.. | ||
common | ||
dns | ||
gmsa | ||
kcc | ||
repl | ||
samdb | ||
schema | ||
tests/python | ||
pydsdb.c | ||
samdb.pc.in | ||
wscript_build |