https://bugs.exim.org/show_bug.cgi?id=3072

            Bug ID: 3072
           Summary: Safer coding
           Product: Exim
           Version: 4.97
          Hardware: All
                OS: All
            Status: NEW
          Severity: bug
          Priority: medium
         Component: Unfiled
          Assignee: [email protected]
          Reporter: [email protected]
                CC: [email protected]

function_store_malloc() and function_store_get()
are given a size_t (unsigned long, 64bit on many current machines)
which is cast/truncated to int (signed 32bit on many machines).

If PCRE2 should request a large (say >4GB) amount of store and use it, things
will go bang.

Existing patch 
https://bugs.exim.org/attachment.cgi?id=1464
- written for 3047 - should suffice.

-- 
You are receiving this mail because:
You are on the CC list for the bug.

-- 
## subscription configuration (requires account):
##   https://lists.exim.org/mailman3/postorius/lists/exim-dev.lists.exim.org/
## unsubscribe (doesn't require an account):
##   [email protected]
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to