![]() The memory allocation in deserializing property lists within the crypto code should not trust the deserialized length and try to allocate that much memory but should first verify that the length is consistent with the number of bytes remaining in the input. (Noted by Coverity as use of tainted data.) Signed-off-by: Erik Boasson <eb@ilities.com> |
||
---|---|---|
.. | ||
api | ||
builtin_plugins | ||
core | ||
CMakeLists.txt |