[tvtime] cppcheck tool discovered same severe errors in the code
Bug #1191093 reported by
Pojar Geo
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
tvtime (Debian) |
Fix Released
|
Unknown
|
|||
tvtime (Ubuntu) |
Fix Released
|
Undecided
|
Pojar Geo |
Bug Description
During a check with the static code analysis tool cppcheck (http://
Related branches
no longer affects: | tvtime |
Changed in tvtime (Ubuntu): | |
assignee: | nobody → POJAR GEO (geoubuntu) |
no longer affects: | tvtime |
Changed in tvtime (Ubuntu): | |
status: | New → Confirmed |
Changed in tvtime (Debian): | |
status: | Unknown → New |
Changed in tvtime (Debian): | |
status: | New → Fix Released |
To post a comment you must log in.
This bug was fixed in the package tvtime - 1.0.2-10ubuntu7
---------------
tvtime (1.0.2-10ubuntu7) saucy; urgency=low
* debian/ patches/ tvtime- 1.0.2-cppcheck. patch: Fix severe errors in the code
discovered with the cppcheck static code analysis tool. (LP: #1191093)
- (error) Possible null pointer dereference: x - otherwise it is redundant
to check it against null.
- (error) Common realloc mistake: x nulled but not freed upon failure.
- (error) Resource leak: x.
- (error) Buffer is accessed out of bounds: x.
- (error) Memory leak: x.
- (error) Dangerous usage of x (strncpy doesn't always null-terminate it).
- (warning) Dangerous usage of strncat - x'rd parameter is the maximum
number of characters to append.
- (warning) The buffer x may not be null-terminated after the call to
strncpy().
-- POJAR GEORGE <email address hidden> Fri, 14 Jun 2013 18:18:36 +0000