Skip to content
Snippets Groups Projects
  1. Sep 26, 2017
    • Niclas Zeising's avatar
      Fix dead code · f49f0879
      Niclas Zeising authored
      The check if buffer == NULL is always false, since buffer is an
      autoamtic variable allocated when entering the function.  What we
      instead want to do is to check if the string is empty after the call to
      exif_get_info(), since that means we could not read any exif
      information.
      When the code once more is enabled, I discovered that we need to copy
      the information string into info_buf as well as into  buffer, since it
      is the former that is used to print the exif information on top of the
      picture.  Without this change, imlib warns about trying to write NULL
      strings.
      f49f0879
    • Niclas Zeising's avatar
      Remove unused variable · 9b4341e1
      Niclas Zeising authored
      9b4341e1
  2. Sep 24, 2017
  3. Sep 16, 2017
  4. Sep 15, 2017
  5. Sep 13, 2017
  6. Sep 05, 2017
  7. Sep 04, 2017
  8. Sep 02, 2017
  9. Aug 31, 2017
  10. Aug 29, 2017
  11. Aug 27, 2017
  12. Aug 25, 2017
  13. Aug 23, 2017
  14. Aug 22, 2017
  15. Aug 21, 2017
  16. Aug 19, 2017
  17. Aug 12, 2017
  18. Aug 10, 2017
  19. Aug 05, 2017
  20. Jun 19, 2017
  21. Apr 16, 2017
  22. Apr 06, 2017
  23. Apr 05, 2017
  24. Apr 02, 2017
  25. Mar 23, 2017
    • Tobias Stoeckmann's avatar
      Fix double-free/OOB-write while receiving IPC data · f7a547b7
      Tobias Stoeckmann authored
      
      If a malicious client pretends to be the E17 window manager, it is
      possible to trigger an out of boundary heap write while receiving an
      IPC message.
      
      The length of the already received message is stored in an unsigned
      short, which overflows after receiving 64 KB of data. It's comparably
      small amount of data and therefore achievable for an attacker.
      
      When len overflows, realloc() will either be called with a small value
      and therefore chars will be appended out of bounds, or len + 1 will be
      exactly 0, in which case realloc() behaves like free(). This could be
      abused for a later double-free attack as it's even possible to overwrite
      the free information -- but this depends on the malloc implementation.
      
      Signed-off-by: default avatarTobias Stoeckmann <tobias@stoeckmann.org>
      f7a547b7
  26. Feb 26, 2017
Loading