[exim-dev] [Bug 3072] New: Safer coding

Αρχική Σελίδα
Delete this message
Reply to this message
Συντάκτης: Exim Bugzilla
Ημερομηνία:  
Προς: exim-dev
Αντικείμενο: [exim-dev] [Bug 3072] New: Safer coding
https://bugs.exim.org/show_bug.cgi?id=3072

            Bug ID: 3072
           Summary: Safer coding
           Product: Exim
           Version: 4.97
          Hardware: All
                OS: All
            Status: NEW
          Severity: bug
          Priority: medium
         Component: Unfiled
          Assignee: unallocated@???
          Reporter: exim@???
                CC: exim-dev@???


function_store_malloc() and function_store_get()
are given a size_t (unsigned long, 64bit on many current machines)
which is cast/truncated to int (signed 32bit on many machines).

If PCRE2 should request a large (say >4GB) amount of store and use it, things
will go bang.

Existing patch
https://bugs.exim.org/attachment.cgi?id=1464
- written for 3047 - should suffice.

--
You are receiving this mail because:
You are on the CC list for the bug.

--
## subscription configuration (requires account):
## https://lists.exim.org/mailman3/postorius/lists/exim-dev.lists.exim.org/
## unsubscribe (doesn't require an account):
## exim-dev-unsubscribe@???
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/