Hi,

Please find the latest report on new defect(s) introduced to Apache-Qpid found 
with Coverity Scan

Defect(s) Reported-by: Coverity Scan

        
** CID 1127840: Use of untrusted string value (TAINTED_STRING)


________________________________________________________________________
CID 1127840: Use of untrusted string value (TAINTED_STRING)

/qpidbuilds/trunk/qpid/cpp/src/tests/XmlClientSessionTest.cpp: 49 ( 
tainted_string_return_content)
   46    
   47    struct XmlFixture {
   48        XmlFixture() {
>>> "qpid::tests::getLibPath(char const *, char const *)" returns tainted 
>>> string content.
   49            qpid::sys::Shlib shlib(getLibPath("XML_LIB"));
   50        }
   51        ~XmlFixture() {}
   52    };
   53    
  

/qpidbuilds/trunk/qpid/cpp/src/tests/XmlClientSessionTest.cpp: 49 ( 
tainted_string)
   46    
   47    struct XmlFixture {
   48        XmlFixture() {
>>> CID 1127840: Use of untrusted string value (TAINTED_STRING)
>>> Passing tainted string "std::string(getLibPath("XML_LIB", NULL))" to 
>>> "qpid::sys::Shlib::Shlib(std::string const &)", which cannot accept tainted 
>>> data.
   49            qpid::sys::Shlib shlib(getLibPath("XML_LIB"));
   50        }
   51        ~XmlFixture() {}
   52    };
   53    
  
________________________________________________________________________
To view the defects in Coverity Scan visit, http://scan.coverity.com

To unsubscribe from the email notification for new defects, 
http://scan5.coverity.com/cgi-bin/unsubscribe.py

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@qpid.apache.org
For additional commands, e-mail: dev-h...@qpid.apache.org

Reply via email to