GNOME Bugzilla – Bug 739844
examples: use snprintf instead of sprintf which is vulnerable
Last modified: 2014-11-09 19:30:20 UTC
There are some places using sprintf, which deos not check buffer boundary. I replaced them to using snprintf.
Created attachment 290272 [details] [review] Use snprintf instead of sprintf which is vulnerable I replaced them to using snprintf.
Created attachment 290273 [details] [review] Use snprintf instead of sprintf which is vulnerable
This is a test, so not really a vulnerability. Also, be careful if you find a real vulnerability, this isn't the appropriate way to submit these. Use the CVE process.
Thanks for the patch, but in this case I think the whole example should just be removed: commit f07de37ad181a6b106b2d0c2003a61ab14e711bc Author: Tim-Philipp Müller <tim@centricular.com> Date: Sun Nov 9 19:23:47 2014 +0000 examples: remove pointless mpegtsmux example Serves no purpose, is not even hooked up to the build system, has hard coded file names and paths, and can easily be replaced with a gst-launch line. https://bugzilla.gnome.org/show_bug.cgi?id=739844
*** Bug 739846 has been marked as a duplicate of this bug. ***