diff options
author | Alan Coopersmith <alan.coopersmith@oracle.com> | 2013-04-12 23:02:11 -0700 |
---|---|---|
committer | Alan Coopersmith <alan.coopersmith@oracle.com> | 2013-05-05 16:00:55 -0700 |
commit | 9e577d40322b9e3d8bdefec0eefa44d8ead451a4 (patch) | |
tree | d85ae13ab99617d6648658ab23339153a37c3dc5 /README | |
parent | e52853974664289fe42a92909667ed77cfa1cec5 (diff) |
integer overflow in XRenderQueryFormats() [CVE-2013-1987 2/3]
The length, numFormats, numScreens, numDepths, and numVisuals members of
the reply are all CARD32 and need to be bounds checked before multiplying
and adding them together to come up with the total size to allocate, to
avoid integer overflow leading to underallocation and writing data from
the network past the end of the allocated buffer.
Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Diffstat (limited to 'README')
0 files changed, 0 insertions, 0 deletions