You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We recently received a security report about unsafe usages. Whilst there's not always a safe alternative available (especially cross-platform) we can still have a check and ensure we have best-effort implementations for:
input validation
buffer management
return values are in proper format (e.g. null terminated strings)
Investigation led to 2 minor fixes (#1046 and #1047). All other occurrences of 'unsafe' functions were already properly guarded, or handled static data that made their uses safe.
Description
We recently received a security report about unsafe usages. Whilst there's not always a safe alternative available (especially cross-platform) we can still have a check and ensure we have best-effort implementations for:
Detailed report:
Format String Vulnerabilities
Buffer Overflow Vulnerabilities
Buffer Overflow Danger Functions
The text was updated successfully, but these errors were encountered: