[Bugs] [Bug 789278] Issues reported by Coverity static analysis tool
bugzilla at redhat.com
bugzilla at redhat.com
Thu Apr 2 10:05:44 UTC 2015
https://bugzilla.redhat.com/show_bug.cgi?id=789278
--- Comment #550 from Anand Avati <aavati at redhat.com> ---
COMMIT: http://review.gluster.org/10063 committed in master by Vijay Bellur
(vbellur at redhat.com)
------
commit 7616738176f44cce8b6cfb0e1f65be8e1dc72f49
Author: Michael Adam <obnox at samba.org>
Date: Tue Mar 31 09:56:35 2015 +0200
libgfdb: fix possible illegal memory access (CID 1288820)
Coverity CID 1288820
strncpy executed with a limit equal to the target array
size potentially leaves the target string not null terminated.
Make sure the copied string is a valid 0 terminated string.
Change-Id: I39ff6a64ca5b9e30562226dd34c5b06267b75b87
BUG: 789278
Signed-off-by: Michael Adam <obnox at samba.org>
Reviewed-on: http://review.gluster.org/10063
Tested-by: Gluster Build System <jenkins at build.gluster.com>
Reviewed-by: Poornima G <pgurusid at redhat.com>
Reviewed-by: Kaleb KEITHLEY <kkeithle at redhat.com>
Reviewed-by: Joseph Fernandes <josferna at redhat.com>
Tested-by: Joseph Fernandes <josferna at redhat.com>
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the Bugs
mailing list