fyi.

---------- Forwarded message ----------
From:  <scan-ad...@coverity.com>
Date: Thu, Aug 29, 2013 at 5:11 PM
Subject: New Defects reported by Coverity Scan for Squid
To: kin...@squid-cache.org



Hi,

Please find the latest report on new defect(s) introduced to Squid
found with Coverity Scan

Defect(s) Reported-by: Coverity Scan


** CID 1070263: Buffer not null terminated (BUFFER_SIZE_WARNING)
/btlayer-02-maximus/squid-3.HEAD-BZR/src/ConfigParser.cc: 241


________________________________________________________________________
CID 1070263: Buffer not null terminated (BUFFER_SIZE_WARNING)

/btlayer-02-maximus/squid-3.HEAD-BZR/src/ConfigParser.cc: 241 (
buffer_size_warning)
   238
   239        if (errorStr) {
   240            if (PreviewMode_)
>>> CID 1070263: Buffer not null terminated (BUFFER_SIZE_WARNING)
>>> Calling strncpy with a maximum size argument of 2048 bytes on destination 
>>> array "UnQuoted" of size 2048 bytes might leave the destination string 
>>> unterminated.
   241                strncpy(UnQuoted, SQUID_ERROR_TOKEN, sizeof(UnQuoted));
   242            else {
   243                debugs(3, DBG_CRITICAL, errorStr << ": " << errorPos);
   244                self_destruct();
   245            }

________________________________________________________________________
To view the defects in Coverity Scan visit, http://scan.coverity.com

To unsubscribe from the email notification for new defects,
http://scan5.coverity.com/cgi-bin/unsubscribe.py


-- 
    /kinkie

Reply via email to