You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi ,I use static analysis tool to find a vulnerable func similar to readString(util/read.c)
Just similar to commit befb74,in func readString (src/actioncompiler/listaction.c) ,there should be a check to avoid buflen integer overflow before line 103. What's more ,there should be a check for buf which is initialized in line 95 in case of malloc fails.
The text was updated successfully, but these errors were encountered:
Hi ,I use static analysis tool to find a vulnerable func similar to readString(util/read.c)
![image](https://user-images.githubusercontent.com/28356082/100854387-e4fd3a80-34c3-11eb-988c-d1c7990d7157.png)
Just similar to commit befb74,in func readString (src/actioncompiler/listaction.c) ,there should be a check to avoid buflen integer overflow before line 103. What's more ,there should be a check for buf which is initialized in line 95 in case of malloc fails.
The text was updated successfully, but these errors were encountered: