Author: dj
Date: 2005-07-27 23:09:14 -0600 (Wed, 27 Jul 2005)
New Revision: 1029

Added:
   trunk/openoffice/OOo_1.1.4-security-1.patch
Log:
Added OOo_1.1.4-security-1.patch

Added: trunk/openoffice/OOo_1.1.4-security-1.patch
===================================================================
--- trunk/openoffice/OOo_1.1.4-security-1.patch 2005-07-27 03:17:28 UTC (rev 
1028)
+++ trunk/openoffice/OOo_1.1.4-security-1.patch 2005-07-28 05:09:14 UTC (rev 
1029)
@@ -0,0 +1,27 @@
+Submitted By: DJ Lucas <dj_AT_linuxfromscratch_DOT_org>
+Date: 2005-07-28
+Initial Package Version: 1.1.4
+Origin: CVS
+Description: Fixes overflow condition (see comments below)
+Upstream Status: Accepted
+
+--- ooo-build-orig/sot/source/sdstor/stgole.cxx        2005-07-27 
23:53:22.000000000 -0500
++++ ooo-build/sot/source/sdstor/stgole.cxx     2005-07-28 00:00:14.000000000 
-0500
+@@ -157,7 +157,16 @@
+               INT32 nLen1 = 0;
+               *this >> nLen1;
+               sal_Char* p = new sal_Char[ (USHORT) nLen1 ];
+-              if( Read( p, nLen1 ) == (ULONG) nLen1 )
++/*
++
++ * This is bad...16 bit value to alocate memory ^^ but 32 bits for length if 
++
++              if( Read( p, nLen1 ) == (ULONG) nLen1 ) 
++
++ * So mask the higher bits to avoid overflow attack 
++
++*/
++              if( Read( p, nLen1&0xFFFF ) == (ULONG) (nLen1&0xFFFF) )
+               {
+                       aUserName = String( p, gsl_getSystemTextEncoding() );
+ /*                    // Now we can read the CB format

-- 
http://linuxfromscratch.org/mailman/listinfo/patches
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to