aboutsummaryrefslogtreecommitdiffstats
path: root/libqpdf/QPDF_linearization.cc
diff options
context:
space:
mode:
authorJay Berkenbilt <ejb@ql.org>2013-10-05 18:28:52 +0200
committerJay Berkenbilt <ejb@ql.org>2013-10-10 02:57:07 +0200
commit10bceb552f1cfd2ddae3c8bfd7d9b38a66e710c4 (patch)
tree35fab8055e7eb30f4a13aa6aabba1ec0aeac2d6f /libqpdf/QPDF_linearization.cc
parent3eb4b066ab3f25f6454214d33b2fc17161812dfa (diff)
downloadqpdf-10bceb552f1cfd2ddae3c8bfd7d9b38a66e710c4.tar.zst
Security: sanitize /W in xref stream
The /W array was not sanitized, possibly causing an integer overflow in a multiplication. An analysis of the code suggests that there were no possible exploits based on this since the problems were in checking expected values but bounds checks were performed on actual values.
Diffstat (limited to 'libqpdf/QPDF_linearization.cc')
0 files changed, 0 insertions, 0 deletions