Using Coverity static analysis tool report a potential string overflow in the following code:
(10) Event fixed_size_dest: You might overrun the 128-character fixed-size string "namebuf" by copying the return value of "inet_ntoa" without checking the length.
(12) Event fixed_size_dest: | You might overrun the 128-character fixed-size string "namebuf" by copying the return value of "inet_ntoa" without checking the length.
(15) Event fixed_size_dest: | You might overrun the 128-character fixed-size string "namebuf" by copying the return value of "inet_ntoa" without checking the length.
Using Coverity static analysis tool report a potential string overflow in the following code:
(10) Event fixed_size_dest: You might overrun the 128-character fixed-size string "namebuf" by copying the return value of "inet_ntoa" without checking the length.
ros_comm/clients/roscpp/src/libros/transport/transport_udp.cpp
Line 715 in 29053c4
(12) Event fixed_size_dest: | You might overrun the 128-character fixed-size string "namebuf" by copying the return value of "inet_ntoa" without checking the length.
ros_comm/clients/roscpp/src/libros/transport/transport_tcp.cpp
Line 744 in 29053c4
(15) Event fixed_size_dest: | You might overrun the 128-character fixed-size string "namebuf" by copying the return value of "inet_ntoa" without checking the length.
ros_comm/clients/roscpp/src/libros/transport/transport_tcp.cpp
Line 291 in 29053c4
The text was updated successfully, but these errors were encountered: