diff options
author | Alan Coopersmith <alan.coopersmith@oracle.com> | 2013-03-01 22:49:01 -0800 |
---|---|---|
committer | Ulrich Sibiller <uli42@gmx.de> | 2016-10-12 09:34:38 +0200 |
commit | 7d18bbe93809a209dcd3590c4f519f19251323d9 (patch) | |
tree | 5071171da34c7444246890ffa88b8686d2a0cfab /nxcompshad | |
parent | 29779559c92c3058edc298ca0a6e59e1293262b6 (diff) | |
download | nx-libs-7d18bbe93809a209dcd3590c4f519f19251323d9.tar.gz nx-libs-7d18bbe93809a209dcd3590c4f519f19251323d9.tar.bz2 nx-libs-7d18bbe93809a209dcd3590c4f519f19251323d9.zip |
integer overflow in XGetMotionEvents() [CVE-2013-1981 4/13]
If the reported number of motion events is too large, the calculations
to allocate memory for them may overflow, leaving us writing beyond the
bounds of the allocation.
v2: Ensure nEvents is set to 0 when returning NULL events pointer
Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Signed-off-by: Julien Cristau <jcristau@debian.org>
Backported-to-NX-by: Ulrich Sibiller <uli42@gmx.de>
Diffstat (limited to 'nxcompshad')
0 files changed, 0 insertions, 0 deletions