Hi,
Please find the latest report on new defect(s) introduced to coreboot found with Coverity Scan.
1 new defect(s) introduced to coreboot found with Coverity Scan. 1 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.
New defect(s) Reported-by: Coverity Scan Showing 1 of 1 defect(s)
** CID 1374795: Memory - corruptions (STRING_OVERFLOW) /src/lib/edid.c: 473 in detailed_block()
________________________________________________________________________________________________________ *** CID 1374795: Memory - corruptions (STRING_OVERFLOW) /src/lib/edid.c: 473 in detailed_block() 467 case 0xFE: 468 /* 469 * TODO: Two of these in a row, in the third and fourth 470 * slots, seems to be specified by SPWG: 471 * https://u2389337.ct.sendgrid.net/wf/click?upn=eMT-2BqXhL85kf4kjMp0VpWCuCeHLr... 472 */
CID 1374795: Memory - corruptions (STRING_OVERFLOW) You might overrun the 14-character destination string "result_edid->ascii_string" by writing 128 characters from "extract_string(x + 5, &c->has_valid_string_termination, 13)".
473 strcpy(result_edid->ascii_string, extract_string(x + 5, 474 &c->has_valid_string_termination, 475 EDID_ASCII_STRING_LENGTH)); 476 printk(BIOS_SPEW, "ASCII string: %s\n", 477 result_edid->ascii_string); 478 return 1;
________________________________________________________________________________________________________ To view the defects in Coverity Scan visit, https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05...
To manage Coverity Scan email notifications for "coreboot@coreboot.org", click https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05...