[asterisk-bugs] [JIRA] (ASTERISK-26195) static analysis: Out of bound array access
Matt Jordan (JIRA)
noreply at issues.asterisk.org
Wed Jul 13 19:59:56 CDT 2016
[ https://issues.asterisk.org/jira/browse/ASTERISK-26195?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Matt Jordan updated ASTERISK-26195:
-----------------------------------
Status: Open (was: Triage)
> static analysis: Out of bound array access
> -------------------------------------------
>
> Key: ASTERISK-26195
> URL: https://issues.asterisk.org/jira/browse/ASTERISK-26195
> Project: Asterisk
> Issue Type: Bug
> Security Level: None
> Components: Applications/app_voicemail, Core/Channels, Core/ManagerInterface
> Reporter: Matt Jordan
>
> Clang's static analysis tool identified three potential out-of-bound array access violations:
> # {{apps/app_voicemail.c}}:
> {code}
> 13141 if (!ast_strlen_zero(p->context)) {
>
> 5
>
> ←
> Taking true branch
> →
> 13142 strcat(mwi_sub->mailbox, "@");
>
> 6
>
> ←
> String copy function overflows destination buffer
> 13143 strcat(mwi_sub->mailbox, p->context);
> 13144 }
> {code}
> # {{main/manager.c}}:
> {code}
> 6682 tmp->tv = ast_tvnow();
> 6683 AST_RWLIST_NEXT(tmp, eq_next) = NULL;
> 6684 strcpy(tmp->eventdata, str);
>
> 7
>
> ←
> String copy function overflows destination buffer
> 6685
> 6686 AST_RWLIST_WRLOCK(&all_events);
> {code}
> # {{main/channel.c}}:
> {code}
> 7384 if (!member) {
>
> 9
>
> ←
> Assuming 'member' is non-null
> →
>
> 10
>
> ←
> Taking false branch
> →
> 7385 ao2_ref(namedgroups, -1);
> 7386 return NULL;
> 7387 }
> 7388 strcpy(member->name, piece);/* Safe */
>
> 11
>
> ←
> String copy function overflows destination buffer
> 7389 member->hash = ast_str_hash(member->name);
> {code}
> See the attached reports on this issue for more information.
--
This message was sent by Atlassian JIRA
(v6.2#6252)
More information about the asterisk-bugs
mailing list