Bug#609075: marked as done (Incorrect use of memset count/value and no null termination)
Your message dated
with message-id <20110327111614.14453.99315.mass-bugs-close@quantz.debian.org>
and subject line sdr removed from Debian unstable
has caused the Debian Bug report #609075,
regarding Incorrect use of memset count/value and no null termination
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)
--
609075: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609075
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: Incorrect use of memset count/value and no null termination
- From: Silvio Cesare <silvio.cesare@gmail.com>
- Date: Thu, 6 Jan 2011 12:51:36 +1100
- Message-id: <AANLkTi=J2KZ2i-mzJMFAvEw0VKwymdLEJBMtWGfgQVFA@mail.gmail.com>
Package: sdr
Version: 3.0-7
Severity: minor
In ./sdr_3.0/src/sap_crypt.c
memset(keylist->keyname, MAXKEYLEN, 0);
memset(keylist->key, MAXKEYLEN, 0);
strncpy(keylist->keyname, keyname, MAXKEYLEN);
strncpy(keylist->key, key, MAXKEYLEN);
It should be memset(keylist->keyname, 0, MAXKEYLEN) etc. Also strncpy does not gaurantee null termination. Maybe strncpy MAXKEYLEN - 1 once the memset is fixed, or solve equivalently.
--- End Message ---
--- Begin Message ---
Version: 3.0-7+rm
sdr has been removed from Debian unstable: http://bugs.debian.org/595306
Closing its bugs with a Version higher than the last unstable upload.
More information about this script at:
http://git.debian.org/?p=users/morph/mass-bugs-close.git;a=blob_plain;f=README;hb=HEAD
--- End Message ---
Reply to: