commit 70a777bd7e51a4c76c15a905dfa2478a20e5aa1f
Author: phantomjinx <p.g.richard...@phantomjinx.co.uk>
Date:   Mon Jul 9 22:33:34 2012 +0100

    Fix an identified buffer overflow
    
    3536102 - Buffer overflow in atomic parsley

 libs/atomic-parsley/AtomicParsley.cpp |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)
---
diff --git a/libs/atomic-parsley/AtomicParsley.cpp 
b/libs/atomic-parsley/AtomicParsley.cpp
index 8603885..69830d5 100644
--- a/libs/atomic-parsley/AtomicParsley.cpp
+++ b/libs/atomic-parsley/AtomicParsley.cpp
@@ -1887,7 +1887,7 @@ char* APar_ExtractDataAtom(int this_atom_number) {
 
             }
             else { //purl & egid would end up here too, but Apple switched it 
to a text string (0x00), so gets taken care above explicitly
-                char* result = (char*) malloc(sizeof(char) * 6);
+                char* result = (char*) malloc(sizeof(char) * 7);
                 sprintf(result, "hex 0x");
 
                 for (int hexx = 1; hexx <= (int) (thisAtom->AtomicLength - 
atom_header_size); ++hexx) {

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
gtkpod-cvs2 mailing list
gtkpod-cvs2@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/gtkpod-cvs2

Reply via email to