Hi,
Please find the latest report on new defect(s) introduced to Apache-Qpid found
with Coverity Scan
Defect(s) Reported-by: Coverity Scan
** CID 1127840: Use of untrusted string value (TAINTED_STRING)
________________________________________________________________________
CID 1127840: Use of untrusted string value (TAINTED_STRING)
/qpidbuilds/trunk/qpid/cpp/src/tests/XmlClientSessionTest.cpp: 49 (
tainted_string_return_content)
46
47 struct XmlFixture {
48 XmlFixture() {
>>> "qpid::tests::getLibPath(char const *, char const *)" returns tainted
>>> string content.
49 qpid::sys::Shlib shlib(getLibPath("XML_LIB"));
50 }
51 ~XmlFixture() {}
52 };
53
/qpidbuilds/trunk/qpid/cpp/src/tests/XmlClientSessionTest.cpp: 49 (
tainted_string)
46
47 struct XmlFixture {
48 XmlFixture() {
>>> CID 1127840: Use of untrusted string value (TAINTED_STRING)
>>> Passing tainted string "std::string(getLibPath("XML_LIB", NULL))" to
>>> "qpid::sys::Shlib::Shlib(std::string const &)", which cannot accept tainted
>>> data.
49 qpid::sys::Shlib shlib(getLibPath("XML_LIB"));
50 }
51 ~XmlFixture() {}
52 };
53
________________________________________________________________________
To view the defects in Coverity Scan visit, http://scan.coverity.com
To unsubscribe from the email notification for new defects,
http://scan5.coverity.com/cgi-bin/unsubscribe.py
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]