Generated code does not check that the server sent enough bytes
The code generated by c_client.py
does not check that the server sent enough bytes. This results in heap-based out-of-bounds memory reads. If the client writes through the returned pointers, out-of-bounds writes result as well.
This is a security vulnerability in setuid programs that use libxcb.