This bug was fixed in the package tvtime - 1.0.2-10ubuntu7

---------------
tvtime (1.0.2-10ubuntu7) saucy; urgency=low

  * debian/patches/tvtime-1.0.2-cppcheck.patch: Fix severe errors in the code
    discovered with the cppcheck static code analysis tool. (LP: #1191093)
    - (error) Possible null pointer dereference: x - otherwise it is redundant
      to check it against null.
    - (error) Common realloc mistake: x nulled but not freed upon failure.
    - (error) Resource leak: x.
    - (error) Buffer is accessed out of bounds: x.
    - (error) Memory leak: x.
    - (error) Dangerous usage of x (strncpy doesn't always null-terminate it).
    - (warning) Dangerous usage of strncat - x'rd parameter is the maximum
      number of characters to append.
    - (warning) The buffer x may not be null-terminated after the call to
      strncpy().
 -- POJAR GEORGE <[email protected]>   Fri, 14 Jun 2013 18:18:36 +0000

** Changed in: tvtime (Ubuntu)
       Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1191093

Title:
  [tvtime] cppcheck tool discovered same severe errors in the code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tvtime/+bug/1191093/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to