[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#609075: marked as done (Incorrect use of memset count/value and no null termination)

Your message dated 
with message-id <20110327111614.14453.99315.mass-bugs-close@quantz.debian.org>
and subject line sdr removed from Debian unstable
has caused the Debian Bug report #609075,
regarding Incorrect use of memset count/value and no null termination
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org

609075: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609075
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sdr
Version: 3.0-7
Severity: minor

In ./sdr_3.0/src/sap_crypt.c

  memset(keylist->keyname, MAXKEYLEN, 0);
  memset(keylist->key, MAXKEYLEN, 0);
  strncpy(keylist->keyname, keyname, MAXKEYLEN);
  strncpy(keylist->key, key, MAXKEYLEN);

It should be memset(keylist->keyname, 0, MAXKEYLEN) etc. Also strncpy does not gaurantee null termination. Maybe strncpy MAXKEYLEN - 1 once the memset is fixed, or solve equivalently.

--- End Message ---
--- Begin Message ---
Version: 3.0-7+rm

sdr has been removed from Debian unstable: http://bugs.debian.org/595306

Closing its bugs with a Version higher than the last unstable upload.

More information about this script at:

--- End Message ---

Reply to: