Hello,

On 12/05/2011 10:08 AM, James Harper wrote:
>> Unfortunately, the previous code was :
>>      /* TODO: see if len contains already the 3 \0 */
>>      item = (CurFile
> *)jcr->file_list->hash_malloc(sizeof(CurFile)+len+3);
>>
>> And the new code is
>>      item = (CurFile
> *)jcr->file_list->hash_malloc(sizeof(CurFile)+len);
>>
>> This is a serious issue that was easy to avoid... :(
>>
>
> Why 3? Could all 3 of the strings in there be blank?

I wrote this code long time ago, and this is probably why I added this 3 
bytes. I have to admit that we should not have this condition, so
this extra care is probably not useful.

I you can run some tests with only +1, it will be helpful. This error is 
not very easy to reproduce.

Bye


-- 
Need professional help and support for Bacula ?
Visit http://www.baculasystems.com

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Bacula-devel mailing list
Bacula-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-devel

Reply via email to