You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@qpid.apache.org by sc...@coverity.com on 2013/11/10 23:51:26 UTC
New Defects reported by Coverity Scan for Apache-Qpid
Hi,
Please find the latest report on new defect(s) introduced to Apache-Qpid found with Coverity Scan
Defect(s) Reported-by: Coverity Scan
** CID 1127840: Use of untrusted string value (TAINTED_STRING)
________________________________________________________________________
CID 1127840: Use of untrusted string value (TAINTED_STRING)
/qpidbuilds/trunk/qpid/cpp/src/tests/XmlClientSessionTest.cpp: 49 ( tainted_string_return_content)
46
47 struct XmlFixture {
48 XmlFixture() {
>>> "qpid::tests::getLibPath(char const *, char const *)" returns tainted string content.
49 qpid::sys::Shlib shlib(getLibPath("XML_LIB"));
50 }
51 ~XmlFixture() {}
52 };
53
/qpidbuilds/trunk/qpid/cpp/src/tests/XmlClientSessionTest.cpp: 49 ( tainted_string)
46
47 struct XmlFixture {
48 XmlFixture() {
>>> CID 1127840: Use of untrusted string value (TAINTED_STRING)
>>> Passing tainted string "std::string(getLibPath("XML_LIB", NULL))" to "qpid::sys::Shlib::Shlib(std::string const &)", which cannot accept tainted data.
49 qpid::sys::Shlib shlib(getLibPath("XML_LIB"));
50 }
51 ~XmlFixture() {}
52 };
53
________________________________________________________________________
To view the defects in Coverity Scan visit, http://scan.coverity.com
To unsubscribe from the email notification for new defects, http://scan5.coverity.com/cgi-bin/unsubscribe.py
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@qpid.apache.org
For additional commands, e-mail: dev-help@qpid.apache.org