Package: libhangul
Version: 0.0.4-2

There are numerous calls to malloc in this library which are not
checked.  malloc is always able to return 0 and the library should be
prepared to cope with this.


Furthermore, there are quite a few places with constructions of this
form:

    combination->table = malloc(sizeof(HangulCombinationItem) * n);

This is susceptible to an integer multiply overflow bug if n is
large.

In particular, if an untrusted caller can cause n to be large enough
to overflow the multiplication then this will usually result in a
security vulnerability.  I don't think this is true in this library
because all of the hangul data, and even the input configuration, is
supposed to be trustworthy.  But it should still be fixed.

Regards,
Ian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to