From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:40442) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1YWL1i-0001S0-Ly for qemu-devel@nongnu.org; Fri, 13 Mar 2015 04:33:03 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1YWL1f-0007Ct-8D for qemu-devel@nongnu.org; Fri, 13 Mar 2015 04:33:02 -0400 Received: from e23smtp06.au.ibm.com ([202.81.31.148]:55057) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1YWL1e-0007CX-Jc for qemu-devel@nongnu.org; Fri, 13 Mar 2015 04:32:59 -0400 Received: from /spool/local by e23smtp06.au.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 13 Mar 2015 18:32:55 +1000 From: "Aneesh Kumar K.V" In-Reply-To: <1426225687-12104-1-git-send-email-zhaoshenglong@huawei.com> References: <1426225687-12104-1-git-send-email-zhaoshenglong@huawei.com> Date: Fri, 13 Mar 2015 14:01:59 +0530 Message-ID: <87zj7h9u2o.fsf@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain Subject: Re: [Qemu-devel] [PATCH] hw/9pfs/virtio-9p-posix-acl: Fix out-of-bounds access List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Shannon Zhao , qemu-devel@nongnu.org Cc: peter.maydell@linaro.org, hangaohuai@huawei.com, qemu-trivial@nongnu.org, mjt@tls.msk.ru, peter.huangpeng@huawei.com, shannon.zhao@linaro.org, pbonzini@redhat.com Shannon Zhao writes: > It's detected by coverity. Fix out-of-bounds access of the function mp_dacl_listxattr. > > Signed-off-by: Shannon Zhao > Signed-off-by: Shannon Zhao > --- > hw/9pfs/virtio-9p-posix-acl.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/hw/9pfs/virtio-9p-posix-acl.c b/hw/9pfs/virtio-9p-posix-acl.c > index 803d9d9..09dad07 100644 > --- a/hw/9pfs/virtio-9p-posix-acl.c > +++ b/hw/9pfs/virtio-9p-posix-acl.c > @@ -114,7 +114,7 @@ static ssize_t mp_dacl_listxattr(FsContext *ctx, const char *path, > } > > /* len includes the trailing NUL */ > - memcpy(value, ACL_ACCESS, len); > + memcpy(value, ACL_DEFAULT, len); > return 0; > } Applied. Thanks -aneesh