This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug libc/17343] New: Signed integer overflow in /stdlib/random_r.c


https://sourceware.org/bugzilla/show_bug.cgi?id=17343

            Bug ID: 17343
           Summary: Signed integer overflow in /stdlib/random_r.c
           Product: glibc
           Version: 2.19
            Status: NEW
          Severity: minor
          Priority: P2
         Component: libc
          Assignee: unassigned at sourceware dot org
          Reporter: xmvlad at yandex dot ru
                CC: drepper.fsp at gmail dot com

Most code in /stdlib/random_r.c use int32_t type to store and manipulate PRNG's
state and so subject to signed integer overflow -> undefined behavior.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]