integer overflow in XListFontsWithInfo() [CVE-2013-1981 3/13]
If the reported number of remaining fonts is too large, the calculations
to allocate memory for them may overflow, leaving us writing beyond the
bounds of the allocation.
v2: Fix reply_left calculations, check calculated sizes fit in reply_left
v3: On error cases, also set values to be returned in pointer args to 0/NULL
Reported-by:
Ilja Van Sprundel <ivansprundel@ioactive.com>
Signed-off-by:
Alan Coopersmith <alan.coopersmith@oracle.com>
Signed-off-by:
Julien Cristau <jcristau@debian.org>
Backported-to-NX-by:
Ulrich Sibiller <uli42@gmx.de>
Showing
Please
register
or
sign in
to comment