Nux

Coverity SECURE_CODING - CID 10657

Bug #937579 reported by Product Strategy Coverity Bug Uploader
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Nux
Status tracked in 4.0
4.0
Fix Released
Medium
Unassigned
nux (Ubuntu)
Fix Released
Medium
Unassigned

Bug Description

This bug is exported from the Coverity Integration Manager on Canonical's servers. For information on how this is done please see this website: https://wiki.ubuntu.com/CanonicalProductStrategy/Coverity
CID: 10657
Checker: SECURE_CODING
Category: No category available
CWE definition: http://cwe.mitre.org/data/definitions/676.html
File: /tmp/buildd/nux-2.4.0/NuxCore/TinyXML/tinyxml.cpp
Function: TiXmlAttribute::QueryIntValue(int *) const
Code snippet:
1389
1390
1391 int TiXmlAttribute::QueryIntValue ( int *ival ) const
1392 {
CID 10657 - SECURE_CODING
[VERY RISKY]. Using "sscanf" can cause a buffer overflow when done incorrectly. sscanf() assumes an arbitrarily large string, so callers must use correct precision specifiers or never use sscanf(). Use correct precision specifiers or do your own parsing.
1393 if ( TIXML_SSCANF ( value.c_str(), "%d", ival ) == 1 )
1394 return TIXML_SUCCESS;
1395
1396 return TIXML_WRONG_TYPE;
1397 }
1398

Related branches

Revision history for this message
Product Strategy Coverity Bug Uploader (coverity-uploader) wrote : nux-trunk: /tmp/buildd/nux-2.4.0/NuxCore/TinyXML/tinyxml.cpp

Source file with Coverity annotations.

Changed in nux:
importance: Undecided → Medium
Changed in nux (Ubuntu):
status: New → Fix Released
importance: Undecided → Medium
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.