patch: libXt-1.0.8 fix possible array overflow

walter harms wharms at bfs.de
Thu Sep 23 09:26:47 PDT 2010



Barry Scott schrieb:
> On Wednesday 22 September 2010 08:18:21 walter harms wrote:
>> hi List,
>> the code checks the upperlimit to 10 while the upperlimit is actualy 9.
> 
> You could use "(sizeof( par )/sizeof( String ))-1" to make the code robust aginst
> a change to the size of par.
> 

yep, i could use XtNumber(), personally i prefer

i%=10;
par=Xtmalloc(i*sizeof(String));

but i wanted to fix the overflow first.

the point i to not understand what do they copy the pointer at all ?
they could yjust do the fprintf() and ready ..


re,
 wh



and change to printf below into a loop



> Barry
> 
>> re,
>>  wh
>>
>>
>> --- libXt-1.0.8/src/Error.c.org 2010-09-21 23:23:00.000000000 +0200
>> +++ libXt-1.0.8/src/Error.c     2010-09-21 23:24:03.000000000 +0200
>> @@ -257,7 +257,7 @@
>>              */
>>             Cardinal i = *num_params;
>>             String par[10];
>> -           if (i > 10) i = 10;
>> +           if (i > 9) i = 9;
>>             (void) memmove((char*)par, (char*)params, i * sizeof(String) );
>>             bzero( &par[i], (10-i) * sizeof(String) );
>>             (void) fprintf (stderr, "%s%s",
>> @@ -292,7 +292,7 @@
>>          */
>>         Cardinal i = *num_params;
>>         String par[10];
>> -       if (i > 10) i = 10;
>> +       if (i > 9) i = 9;
>>         (void) memmove((char*)par, (char*)params, i * sizeof(String) );
>>         bzero( &par[i], (10-i) * sizeof(String) );
>>         if (i != *num_params)
>> _______________________________________________
>> xorg at lists.freedesktop.org: X.Org support
>> Archives: http://lists.freedesktop.org/archives/xorg
>> Info: http://lists.freedesktop.org/mailman/listinfo/xorg
>> Your subscription address: barry.scott at onelan.co.uk
>>
>>
> 



More information about the xorg mailing list