Comment 2 for bug 1191093

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package tvtime - 1.0.2-10ubuntu7

---------------
tvtime (1.0.2-10ubuntu7) saucy; urgency=low

  * debian/patches/tvtime-1.0.2-cppcheck.patch: Fix severe errors in the code
    discovered with the cppcheck static code analysis tool. (LP: #1191093)
    - (error) Possible null pointer dereference: x - otherwise it is redundant
      to check it against null.
    - (error) Common realloc mistake: x nulled but not freed upon failure.
    - (error) Resource leak: x.
    - (error) Buffer is accessed out of bounds: x.
    - (error) Memory leak: x.
    - (error) Dangerous usage of x (strncpy doesn't always null-terminate it).
    - (warning) Dangerous usage of strncat - x'rd parameter is the maximum
      number of characters to append.
    - (warning) The buffer x may not be null-terminated after the call to
      strncpy().
 -- POJAR GEORGE <email address hidden> Fri, 14 Jun 2013 18:18:36 +0000