From: libusb T. <tr...@li...> - 2013-06-19 13:52:28
|
#162: libusb_alloc_transfer vulnerable to integer overflow/underflow -----------------------------------+------------------------ Reporter: meacer | Owner: Type: defect | Status: new Milestone: libusb/libusbx 1.2.0 | Component: libusb-1.0 Resolution: | Keywords: security Blocked By: | Blocks: -----------------------------------+------------------------ Comment (by hansdegoede): As mentioned in one of the first comment, I'm not sure this really belongs in libusb, libusb is not meant to be exported to a possible hostile party without an additional sanitizing layer added on top. Looking at the complexity of the patch, and combining that with the estimate that many many more such patches will be necessary to avoid libusb crashing to due it being fed invalid input, I don't really think we want to go there. libusb simply was never designed to deal with unsanitized input. -- Ticket URL: <https://libusb.org/ticket/162#comment:9> libusb <https://libusb.org/> C library for writing portable USB drivers in userspace |