Skip to content

CVE-2024-28219: Use strncpy to avoid buffer overflow #7599

CVE-2024-28219: Use strncpy to avoid buffer overflow

CVE-2024-28219: Use strncpy to avoid buffer overflow #7599

Triggered via pull request April 1, 2024 08:26
@radarhereradarhere
synchronize #7928
lcms
Status Success
Total duration 36m 47s
Artifacts

test.yml

on: pull_request
Matrix: build
Test Successful
0s
Test Successful
Fit to window
Zoom out
Zoom in

Annotations

1 error and 4 warnings
macos-14 Python 3.10
[notice] A new release of pip is available: 23.0.1 -> 24.0 [notice] To update, run: python3.10 -m pip install --upgrade pip
ubuntu-latest Python 3.12
‘__builtin_strncpy’ specified bound 8 equals destination size [-Wstringop-truncation]
ubuntu-latest Python 3.12
‘__builtin_strncpy’ specified bound 8 equals destination size [-Wstringop-truncation]
ubuntu-latest Python 3.12
‘__builtin_strncpy’ specified bound 8 equals destination size [-Wstringop-truncation]
ubuntu-latest Python 3.12
‘__builtin_strncpy’ specified bound 8 equals destination size [-Wstringop-truncation]