Fwd: New Defects reported by Coverity Scan for Squid

From: Kinkie <kinkie_at_squid-cache.org>
Date: Thu, 29 Aug 2013 19:44:51 +0200

fyi.

---------- Forwarded message ----------
From: <scan-admin_at_coverity.com>
Date: Thu, Aug 29, 2013 at 5:11 PM
Subject: New Defects reported by Coverity Scan for Squid
To: kinkie_at_squid-cache.org

Hi,

Please find the latest report on new defect(s) introduced to Squid
found with Coverity Scan

Defect(s) Reported-by: Coverity Scan

** CID 1070263: Buffer not null terminated (BUFFER_SIZE_WARNING)
/btlayer-02-maximus/squid-3.HEAD-BZR/src/ConfigParser.cc: 241

________________________________________________________________________
CID 1070263: Buffer not null terminated (BUFFER_SIZE_WARNING)

/btlayer-02-maximus/squid-3.HEAD-BZR/src/ConfigParser.cc: 241 (
buffer_size_warning)
   238
   239 if (errorStr) {
   240 if (PreviewMode_)
>>> CID 1070263: Buffer not null terminated (BUFFER_SIZE_WARNING)
>>> Calling strncpy with a maximum size argument of 2048 bytes on destination array "UnQuoted" of size 2048 bytes might leave the destination string unterminated.
   241 strncpy(UnQuoted, SQUID_ERROR_TOKEN, sizeof(UnQuoted));
   242 else {
   243 debugs(3, DBG_CRITICAL, errorStr << ": " << errorPos);
   244 self_destruct();
   245 }

________________________________________________________________________
To view the defects in Coverity Scan visit, http://scan.coverity.com

To unsubscribe from the email notification for new defects,
http://scan5.coverity.com/cgi-bin/unsubscribe.py

-- 
    /kinkie
Received on Thu Aug 29 2013 - 17:44:59 MDT

This archive was generated by hypermail 2.2.0 : Fri Aug 30 2013 - 12:00:31 MDT