[Bugs] [Bug 789278] Issues reported by Coverity static analysis tool

bugzilla at redhat.com bugzilla at redhat.com
Wed Apr 1 17:07:10 UTC 2015


https://bugzilla.redhat.com/show_bug.cgi?id=789278



--- Comment #545 from Anand Avati <aavati at redhat.com> ---
COMMIT: http://review.gluster.org/10059 committed in master by Venky Shankar
(vshankar at redhat.com) 
------
commit dc26a253f5f393745bd435721e31d6e2e598eed1
Author: Michael Adam <obnox at samba.org>
Date:   Tue Mar 31 02:36:30 2015 +0200

    features/changelog: fix possible memory illegal access (2 of 2, coverity)

    Coverity CID 1288822 (#2 of 2)

    strncpy executed with a limit equal to the target array
    size potentially leaves the target string not null terminated.
    Make sure the copied string is a valid 0 terminated string.

    Change-Id: If283dd6f716912f65729edf6ea26a4331a697151
    BUG: 789278
    Signed-off-by: Michael Adam <obnox at samba.org>
    Reviewed-on: http://review.gluster.org/10059
    Tested-by: Gluster Build System <jenkins at build.gluster.com>
    Reviewed-by: Poornima G <pgurusid at redhat.com>
    Reviewed-by: Kaleb KEITHLEY <kkeithle at redhat.com>
    Reviewed-by: Venky Shankar <vshankar at redhat.com>
    Tested-by: Venky Shankar <vshankar at redhat.com>

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the Bugs mailing list