fyi.
---------- Forwarded message ----------
From: <scan-admin_at_coverity.com>
Date: Thu, Aug 29, 2013 at 5:11 PM
Subject: New Defects reported by Coverity Scan for Squid
To: kinkie_at_squid-cache.org
Hi,
Please find the latest report on new defect(s) introduced to Squid
found with Coverity Scan
Defect(s) Reported-by: Coverity Scan
** CID 1070263: Buffer not null terminated (BUFFER_SIZE_WARNING)
/btlayer-02-maximus/squid-3.HEAD-BZR/src/ConfigParser.cc: 241
________________________________________________________________________
CID 1070263: Buffer not null terminated (BUFFER_SIZE_WARNING)
/btlayer-02-maximus/squid-3.HEAD-BZR/src/ConfigParser.cc: 241 (
buffer_size_warning)
238
239 if (errorStr) {
240 if (PreviewMode_)
>>> CID 1070263: Buffer not null terminated (BUFFER_SIZE_WARNING)
>>> Calling strncpy with a maximum size argument of 2048 bytes on destination array "UnQuoted" of size 2048 bytes might leave the destination string unterminated.
241 strncpy(UnQuoted, SQUID_ERROR_TOKEN, sizeof(UnQuoted));
242 else {
243 debugs(3, DBG_CRITICAL, errorStr << ": " << errorPos);
244 self_destruct();
245 }
________________________________________________________________________
To view the defects in Coverity Scan visit, http://scan.coverity.com
To unsubscribe from the email notification for new defects,
http://scan5.coverity.com/cgi-bin/unsubscribe.py
-- /kinkieReceived on Thu Aug 29 2013 - 17:44:59 MDT
This archive was generated by hypermail 2.2.0 : Fri Aug 30 2013 - 12:00:31 MDT