For some reason, I have a feeling the adversary controls 'line', which gnupg is
attempting to parse.
/usr/local/bin/scan-build/ccc-analyzer -DHAVE_CONFIG_H -I. -I.. -I../gl
-I../intl -DLOCALEDIR=\"/home/jwalton/gpg-analyze/share/locale\"
-DGNUPG_BINDIR="\"/home/jwalton/gpg-analyze/bin\""
-DGNUPG_LIBEXECDIR="\"/home/jwalton/gpg-analyze/libexec\""
-DGNUPG_LIBDIR="\"/home/jwalton/gpg-analyze/lib/gnupg\""
-DGNUPG_DATADIR="\"/home/jwalton/gpg-analyze/share/gnupg\""
-DGNUPG_SYSCONFDIR="\"/home/jwalton/gpg-analyze/etc/gnupg\""
-DGNUPG_LOCALSTATEDIR="\"/home/jwalton/gpg-analyze/var\""
-I/home/jwalton/gpg-analyze/include -I/usr/local/include
-I/home/jwalton/gpg-analyze/include -I/home/jwalton/gpg-analyze/include
-I/usr/include/p11-kit-1 -I/home/jwalton/gpg-analyze/include -g3 -O1 -Wall
-Wno-pointer-sign -Wpointer-arith -MT libcommontlsnpth_a-http.o -MD -MP -MF
.deps/libcommontlsnpth_a-http.Tpo -c -o libcommontlsnpth_a-http.o `test -f
'http.c' || echo './'`http.c
http.c:836:8: warning: Access to field 'in_data' results in a dereference of a
null pointer (loaded from variable 'hd')
if (!hd->in_data) ^~~~~~~~~~~
http.c:1884:3: warning: String copy function overflows destination buffer
strcpy (h->name, line); ^~~~~~~~~~~~~~~~~~~~~~
2 warnings generated.