Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 20 Jul 2016 23:33:11 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 211257] net/xmlrpc-c overflow warning
Message-ID:  <bug-211257-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D211257

            Bug ID: 211257
           Summary: net/xmlrpc-c overflow warning
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: garga@FreeBSD.org
          Reporter: w.schwarzenfeld@utanet.at
          Assignee: garga@FreeBSD.org
             Flags: maintainer-feedback?(garga@FreeBSD.org)

Don't know if it is realy relevant, but:

xmlrpc_datetime.c:164:17: warning: the value of the size argument in 'strnc=
at'
is too large, might lead to a buffer overflow [-Wstrncat-size]
                STRSCAT(dtString, usecString);
                ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
blddir/include/xmlrpc-c/string_int.h:125:24: note: expanded from macro
'STRSCAT'

and

xmlrpc_serialize.c:308:13: warning: the value of the size argument in 'strn=
cat'
is too large, might lead to a buffer overflow [-Wstrncat-size]
            STRSCAT(dtString, usecString);
            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
blddir/include/xmlrpc-c/string_int.h:125:24: note: expanded from macro
'STRSCAT'
--

macro is defined      in
net/xmlrpc-c/work/xmlrpc-c-1.39.08/src/blddir/include/xmlrpc-c/string_int.h

124 #define STRSCAT(A,B) \
125     (strncat((A), (B), sizeof(A)-strlen(A)), *((A)+sizeof(A)-1) =3D '\0=
')

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-211257-13>