Attached is a patch for DFB 1.4.3 to fix a single DFB application usage model 
memory corruption defect in fusion_skirmish_init.  This occurred previously 
when it called strcpy due to the name string buffer pointer being incorrectly 
calculated.  This injection was introduced 2010.12.08 as part of git commit 
91afed9692ff15ffc7d2b6221aa5cd061ff44fa9.

I discovered it after investigating why our system driver (which is being 
transitioned to DFB 1.4.3 from 1.2.10) was encountering memory and freeing 
related errors.  It turned out the systems driver used several skirmishes (some 
with long names such as 32 characters long), and at last one structure had a 
skirmish with various other pointers stored after it that were corrupted by the 
skirmish overwriting them when it tried to make a copy of the skirmish name.

Regards,
Timothy

--

Timothy Strelchun
CE Software Engineering
Digital Home Group
Intel Corporation

The views expressed above are my own and not those of Intel

Attachment: DirectFB-1.4.3_FixSingleAppSkirmish.patch
Description: DirectFB-1.4.3_FixSingleAppSkirmish.patch

_______________________________________________
directfb-dev mailing list
directfb-dev@directfb.org
http://mail.directfb.org/cgi-bin/mailman/listinfo/directfb-dev

Reply via email to