You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@xalan.apache.org by "Int3 (JIRA)" <ji...@apache.org> on 2015/03/02 05:29:04 UTC
[jira] [Created] (XALANC-760) Code analysis revealed multiple
potential buffer overflows
Int3 created XALANC-760:
---------------------------
Summary: Code analysis revealed multiple potential buffer overflows
Key: XALANC-760
URL: https://issues.apache.org/jira/browse/XALANC-760
Project: XalanC
Issue Type: Bug
Components: XalanC
Affects Versions: 1.11
Reporter: Int3
Assignee: Steven J. Hathaway
src/xalanc/Harness/XalanXMLFileReporter.cpp
The float at line 490 can exceed 40 bytes in length (max double is 317 bytes)
src/xalanc/Utils/MsgCreator/MsgCreator.cpp
This utility lacks any buffer bounding to protect against buffer overflows
src/xalanc/Utils/MsgCreator/InMemHandler.cpp
This utility lacks any buffer bounding to protect against buffer overflows
src/xalanc/XalanExe/XalanExe.cpp
There is no upper bound on n_maxParams
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@xalan.apache.org
For additional commands, e-mail: dev-help@xalan.apache.org