aboutsummaryrefslogtreecommitdiff
path: root/nxproxy
diff options
context:
space:
mode:
authorAlan Coopersmith <alan.coopersmith@oracle.com>2013-03-01 18:37:37 -0800
committerUlrich Sibiller <uli42@gmx.de>2016-10-19 21:40:27 +0200
commit7992a98737cfc8a61b996951cb126820c87277dd (patch)
tree40e11e06ea10f82175c945350ba33a41e7a83c55 /nxproxy
parent78b0ca2fe42ca998708490854d5f5f38ca90d0a8 (diff)
downloadnx-libs-7992a98737cfc8a61b996951cb126820c87277dd.tar.gz
nx-libs-7992a98737cfc8a61b996951cb126820c87277dd.tar.bz2
nx-libs-7992a98737cfc8a61b996951cb126820c87277dd.zip
integer overflow in ReadInFile() in Xrm.c [CVE-2013-1981 7/13]
Called from XrmGetFileDatabase() which gets called from InitDefaults() which gets the filename from getenv ("XENVIRONMENT") If file is exactly 0xffffffff bytes long (or longer and truncates to 0xffffffff, on implementations where off_t is larger than an int), then size may be set to a value which overflows causing less memory to be allocated than is written to by the following read() call. size is left limited to an int, because if your Xresources file is larger than 2gb, you're very definitely doing it wrong. Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com> Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com> Reviewed-by: Matthieu Herrb <matthieu.herrb@laas.fr> Backported-to-NX-by: Ulrich Sibiller <uli42@gmx.de>
Diffstat (limited to 'nxproxy')
0 files changed, 0 insertions, 0 deletions