aboutsummaryrefslogtreecommitdiff
path: root/debian/libnx-xinerama1.postinst.in
diff options
context:
space:
mode:
authorMike DePaulo <mikedep333@gmail.com>2015-02-08 22:19:01 -0500
committerMike Gabriel <mike.gabriel@das-netzwerkteam.de>2015-02-14 16:14:31 +0100
commitbb7abd9da9badc6cb825c636867cbef827141f36 (patch)
treea14541b68c461db7093750c424b2254a88948c6c /debian/libnx-xinerama1.postinst.in
parentc6aebf9284855a0e24ad9c5ffdd36aa65e16bec7 (diff)
downloadnx-libs-bb7abd9da9badc6cb825c636867cbef827141f36.tar.gz
nx-libs-bb7abd9da9badc6cb825c636867cbef827141f36.tar.bz2
nx-libs-bb7abd9da9badc6cb825c636867cbef827141f36.zip
CVE-2014-0211: integer overflow in fs_read_extent_info() from xorg/lib/libXfont commit c578408c1fd4db09e4e3173f8a9e65c81cc187c1
fs_read_extent_info() parses a reply from the font server. The reply contains a 32bit number of elements field which is used to calculate a buffer length. There is an integer overflow in this calculation which can lead to memory corruption.
Diffstat (limited to 'debian/libnx-xinerama1.postinst.in')
0 files changed, 0 insertions, 0 deletions