[PATCH] [CVE-2022-29824] Fix integer overflows in xmlBuf and xmlBuffer 27/294427/1 accepted/tizen/6.0/base/tool/20230625.221407 submit/tizen_6.0_base/20230619.064314
authorJinWang An <jinwang.an@samsung.com>
Mon, 19 Jun 2023 06:19:44 +0000 (15:19 +0900)
committerJinWang An <jinwang.an@samsung.com>
Mon, 19 Jun 2023 06:20:55 +0000 (15:20 +0900)
commita58184a0533c8833ddc91e10a8677d9ac59dd1fe
treee3e4327cb976ad70830f6bcec06695755ce64bb4
parent63a9f680a00f402a5abcdec27e66ae9221ab5868
[PATCH] [CVE-2022-29824] Fix integer overflows in xmlBuf and xmlBuffer

From 6c283d83eccd940bcde15634ac8c7f100e3caefd Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Tue, 8 Mar 2022 20:10:02 +0100

In several places, the code handling string buffers didn't check for
integer overflow or used wrong types for buffer sizes. This could
result in out-of-bounds writes or other memory errors when working on
large, multi-gigabyte buffers.

Thanks to Felix Wilhelm for the report.

Change-Id: If3a2ec6b91d5ddcbea476ad674d85476a37d2c07
Signed-off-by: JinWang An <jinwang.an@samsung.com>
buf.c
tree.c