Thanks for this report! Since the w and h variables are unsigned, this
is actually "just" a denial of service crash, since the loop that copies
out the data will run until it segfaults, so the results aren't
controllable.

** Changed in: gdk-pixbuf (Ubuntu)
       Status: New => Confirmed

** Changed in: gdk-pixbuf (Ubuntu)
   Importance: Undecided => Low

** This bug is no longer flagged as a security vulnerability

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.
https://bugs.launchpad.net/bugs/681150

Title:
  Integer overflow in XBM file loader

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to