From fc77ee51717d3ca8e7d50ff46f2738cee475a84f Mon Sep 17 00:00:00 2001 From: Volker Lendecke Date: Tue, 15 May 2012 19:26:48 +0200 Subject: s3: Fix Coverity ID 242710 Untrusted pointer read According to susv3 we have to make sure that we call isupper with values only in the range of an unsigned char. This is best achieved by automatic narrowing through assignment. --- source3/utils/net_registry_check.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'source3') diff --git a/source3/utils/net_registry_check.c b/source3/utils/net_registry_check.c index 8d1a91c44b..6e455db2d8 100644 --- a/source3/utils/net_registry_check.c +++ b/source3/utils/net_registry_check.c @@ -788,7 +788,7 @@ static int check_tdb_action(struct db_record *rec, void *check_ctx) } if (invalid_path) { - int action; + unsigned char action; if (ctx->opt.output == NULL) { action = first_iter ? 'r' : 's'; } else if (ctx->opt.automatic) { -- cgit