commit 70a777bd7e51a4c76c15a905dfa2478a20e5aa1f Author: phantomjinx <p.g.richard...@phantomjinx.co.uk> Date: Mon Jul 9 22:33:34 2012 +0100
Fix an identified buffer overflow 3536102 - Buffer overflow in atomic parsley libs/atomic-parsley/AtomicParsley.cpp | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) --- diff --git a/libs/atomic-parsley/AtomicParsley.cpp b/libs/atomic-parsley/AtomicParsley.cpp index 8603885..69830d5 100644 --- a/libs/atomic-parsley/AtomicParsley.cpp +++ b/libs/atomic-parsley/AtomicParsley.cpp @@ -1887,7 +1887,7 @@ char* APar_ExtractDataAtom(int this_atom_number) { } else { //purl & egid would end up here too, but Apple switched it to a text string (0x00), so gets taken care above explicitly - char* result = (char*) malloc(sizeof(char) * 6); + char* result = (char*) malloc(sizeof(char) * 7); sprintf(result, "hex 0x"); for (int hexx = 1; hexx <= (int) (thisAtom->AtomicLength - atom_header_size); ++hexx) { ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ gtkpod-cvs2 mailing list gtkpod-cvs2@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/gtkpod-cvs2