This bug was fixed in the package tvtime - 1.0.2-10ubuntu7
---------------
tvtime (1.0.2-10ubuntu7) saucy; urgency=low
* debian/patches/tvtime-1.0.2-cppcheck.patch: Fix severe errors in the code
discovered with the cppcheck static code analysis tool. (LP: #1191093)
- (error) Possible null pointer dereference: x - otherwise it is redundant
to check it against null.
- (error) Common realloc mistake: x nulled but not freed upon failure.
- (error) Resource leak: x.
- (error) Buffer is accessed out of bounds: x.
- (error) Memory leak: x.
- (error) Dangerous usage of x (strncpy doesn't always null-terminate it).
- (warning) Dangerous usage of strncat - x'rd parameter is the maximum
number of characters to append.
- (warning) The buffer x may not be null-terminated after the call to
strncpy().
-- POJAR GEORGE <[email protected]> Fri, 14 Jun 2013 18:18:36 +0000
** Changed in: tvtime (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1191093
Title:
[tvtime] cppcheck tool discovered same severe errors in the code
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tvtime/+bug/1191093/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs