fyi.
---------- Forwarded message ---------- From: <scan-ad...@coverity.com> Date: Thu, Aug 29, 2013 at 5:11 PM Subject: New Defects reported by Coverity Scan for Squid To: kin...@squid-cache.org Hi, Please find the latest report on new defect(s) introduced to Squid found with Coverity Scan Defect(s) Reported-by: Coverity Scan ** CID 1070263: Buffer not null terminated (BUFFER_SIZE_WARNING) /btlayer-02-maximus/squid-3.HEAD-BZR/src/ConfigParser.cc: 241 ________________________________________________________________________ CID 1070263: Buffer not null terminated (BUFFER_SIZE_WARNING) /btlayer-02-maximus/squid-3.HEAD-BZR/src/ConfigParser.cc: 241 ( buffer_size_warning) 238 239 if (errorStr) { 240 if (PreviewMode_) >>> CID 1070263: Buffer not null terminated (BUFFER_SIZE_WARNING) >>> Calling strncpy with a maximum size argument of 2048 bytes on destination >>> array "UnQuoted" of size 2048 bytes might leave the destination string >>> unterminated. 241 strncpy(UnQuoted, SQUID_ERROR_TOKEN, sizeof(UnQuoted)); 242 else { 243 debugs(3, DBG_CRITICAL, errorStr << ": " << errorPos); 244 self_destruct(); 245 } ________________________________________________________________________ To view the defects in Coverity Scan visit, http://scan.coverity.com To unsubscribe from the email notification for new defects, http://scan5.coverity.com/cgi-bin/unsubscribe.py -- /kinkie