Coverity SECURE_CODING - CID 10657
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
Nux | Status tracked in 4.0 | |||||
4.0 |
Fix Released
|
Medium
|
Unassigned | |||
nux (Ubuntu) |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug is exported from the Coverity Integration Manager on Canonical's servers. For information on how this is done please see this website: https:/
CID: 10657
Checker: SECURE_CODING
Category: No category available
CWE definition: http://
File: /tmp/buildd/
Function: TiXmlAttribute:
Code snippet:
1389
1390
1391 int TiXmlAttribute:
1392 {
CID 10657 - SECURE_CODING
[VERY RISKY]. Using "sscanf" can cause a buffer overflow when done incorrectly. sscanf() assumes an arbitrarily large string, so callers must use correct precision specifiers or never use sscanf(). Use correct precision specifiers or do your own parsing.
1393 if ( TIXML_SSCANF ( value.c_str(), "%d", ival ) == 1 )
1394 return TIXML_SUCCESS;
1395
1396 return TIXML_WRONG_TYPE;
1397 }
1398
Related branches
- Jay Taoko (community): Needs Fixing
-
Diff: 6928 lines (+10/-6815)10 files modifiedNux/Theme.cpp (+1/-1)
NuxCore/Makefile.am (+1/-13)
NuxCore/TinyXML/tinystr.cpp (+0/-142)
NuxCore/TinyXML/tinystr.h (+0/-396)
NuxCore/TinyXML/tinyxml.cpp (+0/-2103)
NuxCore/TinyXML/tinyxml.h (+0/-2264)
NuxCore/TinyXML/tinyxmlerror.cpp (+0/-75)
NuxCore/TinyXML/tinyxmlparser.cpp (+0/-1819)
configure.ac (+7/-1)
tools/unity_support_test.c (+1/-1)
Changed in nux (Ubuntu): | |
status: | New → Fix Released |
importance: | Undecided → Medium |
Source file with Coverity annotations.