commit 70a777bd7e51a4c76c15a905dfa2478a20e5aa1f
Author: phantomjinx <[email protected]>
Date: Mon Jul 9 22:33:34 2012 +0100
Fix an identified buffer overflow
3536102 - Buffer overflow in atomic parsley
libs/atomic-parsley/AtomicParsley.cpp | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
---
diff --git a/libs/atomic-parsley/AtomicParsley.cpp
b/libs/atomic-parsley/AtomicParsley.cpp
index 8603885..69830d5 100644
--- a/libs/atomic-parsley/AtomicParsley.cpp
+++ b/libs/atomic-parsley/AtomicParsley.cpp
@@ -1887,7 +1887,7 @@ char* APar_ExtractDataAtom(int this_atom_number) {
}
else { //purl & egid would end up here too, but Apple switched it
to a text string (0x00), so gets taken care above explicitly
- char* result = (char*) malloc(sizeof(char) * 6);
+ char* result = (char*) malloc(sizeof(char) * 7);
sprintf(result, "hex 0x");
for (int hexx = 1; hexx <= (int) (thisAtom->AtomicLength -
atom_header_size); ++hexx) {
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
gtkpod-cvs2 mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/gtkpod-cvs2