diff options
author | Natanael Copa <ncopa@alpinelinux.org> | 2013-06-06 16:15:24 +0000 |
---|---|---|
committer | Natanael Copa <ncopa@alpinelinux.org> | 2013-06-06 16:15:24 +0000 |
commit | a2e6a170d7f82935f55d6b1dfd7cd408475983cd (patch) | |
tree | 4a1505b7a5d135ce62201dcee97d5e8e9a185d15 /main/libxv/0005-integer-overflow-in-XvCreateImage-CVE-2013-1989-3-3.patch | |
parent | a9923133bcabf62806552e5661d63f0347e205b6 (diff) | |
download | aports-a2e6a170d7f82935f55d6b1dfd7cd408475983cd.tar.bz2 aports-a2e6a170d7f82935f55d6b1dfd7cd408475983cd.tar.xz |
main/libxv: upgrade to 1.0.8
Diffstat (limited to 'main/libxv/0005-integer-overflow-in-XvCreateImage-CVE-2013-1989-3-3.patch')
-rw-r--r-- | main/libxv/0005-integer-overflow-in-XvCreateImage-CVE-2013-1989-3-3.patch | 35 |
1 files changed, 0 insertions, 35 deletions
diff --git a/main/libxv/0005-integer-overflow-in-XvCreateImage-CVE-2013-1989-3-3.patch b/main/libxv/0005-integer-overflow-in-XvCreateImage-CVE-2013-1989-3-3.patch deleted file mode 100644 index 2be6900c3..000000000 --- a/main/libxv/0005-integer-overflow-in-XvCreateImage-CVE-2013-1989-3-3.patch +++ /dev/null @@ -1,35 +0,0 @@ -From 50fc4cb18069cb9450a02c13f80223ef23511409 Mon Sep 17 00:00:00 2001 -From: Alan Coopersmith <alan.coopersmith@oracle.com> -Date: Sat, 13 Apr 2013 00:03:03 -0700 -Subject: [PATCH 5/5] integer overflow in XvCreateImage() [CVE-2013-1989 3/3] - -num_planes is a CARD32 and needs to be bounds checked before bit shifting -and adding to sizeof(XvImage) to come up with the total size to allocate, -to avoid integer overflow leading to underallocation and writing data from -the network past the end of the allocated buffer. - -Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com> -Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com> ---- - src/Xv.c | 5 ++++- - 1 file changed, 4 insertions(+), 1 deletion(-) - -diff --git a/src/Xv.c b/src/Xv.c -index 0a07d9d..f268f8e 100644 ---- a/src/Xv.c -+++ b/src/Xv.c -@@ -992,7 +992,10 @@ XvImage * XvCreateImage ( - return NULL; - } - -- if((ret = (XvImage*)Xmalloc(sizeof(XvImage) + (rep.num_planes << 3)))) { -+ if (rep.num_planes < ((INT_MAX >> 3) - sizeof(XvImage))) -+ ret = Xmalloc(sizeof(XvImage) + (rep.num_planes << 3)); -+ -+ if (ret != NULL) { - ret->id = id; - ret->width = rep.width; - ret->height = rep.height; --- -1.8.2.3 - |