Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:16.0:Staging:adi:97
mozjs78
mozjs78-CVE-2024-45492.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File mozjs78-CVE-2024-45492.patch of Package mozjs78
From 9bf0f2c16ee86f644dd1432507edff94c08dc232 Mon Sep 17 00:00:00 2001 From: Sebastian Pipping <sebastian@pipping.org> Date: Mon, 19 Aug 2024 22:37:16 +0200 Subject: [PATCH] lib: Detect integer overflow in function nextScaffoldPart References: CVE-2024-45492 References: bsc#1230038 Upstream: Backport from upstream Reported by TaiYou --- expat/lib/xmlparse.c | 9 +++++++++ 1 file changed, 9 insertions(+) --- firefox-78.15.0/parser/expat/lib/xmlparse.c +++ firefox-78.15.0_new/parser/expat/lib/xmlparse.c @@ -6987,6 +6987,15 @@ int next; if (!dtd->scaffIndex) { + /* Detect and prevent integer overflow. + * The preprocessor guard addresses the "always false" warning + * from -Wtype-limits on platforms where + * sizeof(unsigned int) < sizeof(size_t), e.g. on x86_64. */ +#if UINT_MAX >= SIZE_MAX + if (parser->m_groupSize > ((size_t)(-1) / sizeof(int))) { + return -1; + } +#endif dtd->scaffIndex = (int *)MALLOC(groupSize * sizeof(int)); if (!dtd->scaffIndex) return -1;
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor