Skip to content

Conversation

@gabrielfalcao
Copy link

@gabrielfalcao gabrielfalcao commented Oct 11, 2023

Mitigates memory vulnerabilities through explicit usage of bzero() in lieu of memset(..., 0, ...)

@google-cla
Copy link

google-cla bot commented Oct 11, 2023

Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

View this failed invocation of the CLA check for more information.

For the most up to date status, view the checks section at the bottom of the pull request.

@gabrielfalcao gabrielfalcao changed the title chore: CVE-2023-5217 CVE-2023-5217 Mitigates memory vulnerabilities through explicit usage of bzero() in lieu of memset(..., 0, ...) Oct 11, 2023
IOW: synchronizes lines of Track::Info::CopyStr from upstream - nothing new
---

* libwebm: brings in relatively safer-and-more-appropriate code from upstream
 * .i.e.:
  * memcpy in lieu of strcpy
  * align *_MAX return values to the adequate types
* vp8: presents snprintf in lieu of sprintf
hubot pushed a commit that referenced this pull request Jan 8, 2025
Before v1.15.0: c=10, a=1, r=0

Rule #3: source code has changed, increment r:
r=1

Rule #4: interfaces were removed in vpx_tpl.h, set r=0, increment c:
c=11, r=0

Rule #5: no interfaces have been added

Rule #6: interfaces were removed in vpx_tpl.h, set a=0:
a=0

After release: c=11, a=0, r=0

major = c-a = 11
minor = a = 0
patch = r = 0

Bug: webm:384672478
Change-Id: I2e70e7e35c64ece32eaf1dc5625640965483f9b9
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant