diff options
author | Paul Pluzhnikov <ppluzhnikov@google.com> | 2015-02-06 00:30:42 -0500 |
---|---|---|
committer | Carlos O'Donell <carlos@systemhalted.org> | 2015-02-06 00:34:51 -0500 |
commit | 5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06 (patch) | |
tree | a77a8efbf88a4eed15cfefe4e5d570d380985c1c /stdio-common/tst-cookie.c | |
parent | 04cb913ddf67ac90da274dd32b6ceafd57ca36ca (diff) | |
download | glibc-5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06.tar.gz glibc-5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06.tar.xz glibc-5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06.zip |
CVE-2015-1472: wscanf allocates too little memory
BZ #16618 Under certain conditions wscanf can allocate too little memory for the to-be-scanned arguments and overflow the allocated buffer. The implementation now correctly computes the required buffer size when using malloc. A regression test was added to tst-sscanf.
Diffstat (limited to 'stdio-common/tst-cookie.c')
0 files changed, 0 insertions, 0 deletions