Hide Forgot
Description of problem: /src/libvirtGuestTable_data_get.c:204 - Strlen returns length of string, not including the terminating '\0' character. /src/libvirtGuestTable_data_get.c:218 - Destination string is filled without terminating character. Version-Release number of selected component (if applicable): 0.0.2-1 Additional info: This issue was found during the analysis of Coverity scan report.
Fixes for all the problems uncovered by coverity have been pushed upstream: commit 51e5c3014d7d162d7d8a2aaccb42b6a0092b825d Author: Laine Stump <laine> Date: Tue Oct 18 13:07:50 2011 -0400 fix startup logic for selecting stderr vs syslog This bug was uncovered by coverity during the run that resulted in the filing of the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=732015 use_syslog was initialized to 0, and then if the "Use stderr" option was selected, it was set to ... "0"! Rather than simply initializing to 1, I decided to reduce confusion by renaming the variable to "use_stderr", leave it initialized to 0, then set to 1 when the user asks for stderr. commit e5b3fd6b6ef3cd8fda00f74291e6fb2174cc806b Author: Laine Stump <laine> Date: Tue Oct 18 12:47:45 2011 -0400 eliminate bogus check for "NULL" array This is another bug found by coverity in: https://bugzilla.redhat.com/show_bug.cgi?id=732015 Apparently libvirtGuestUUID was originally a pointer, and the code was making sure that it had memory allocated, but now it is an array that is contained in the structure, so checking for NULL makes no sense. commit 17e238092ccaa3d6386ab668b651b3031f009e60 Author: Laine Stump <laine> Date: Tue Oct 18 12:40:41 2011 -0400 allocate enough space for trailing NULL in string This bug was found by coverity. See: https://bugzilla.redhat.com/show_bug.cgi?id=732015
I can reproduce this issue and the latest Coverity result is fine for libvirt-snmp-0.0.2-2.el6, I haven't seen previous errors again and everything is okay, please see http://releng-test1.englab.brq.redhat.com/covscan/task/177/, so move the bug to VERIFIED status. Alex
Move the bug to VERIFIED status based on latest Coverity result: http://releng-test1.englab.brq.redhat.com/covscan/task/179/
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHEA-2011-1609.html