Author: randy Date: 2008-03-24 22:07:54 -0600 (Mon, 24 Mar 2008) New Revision: 1930
Added: trunk/espgs/espgs-8.15.4-bov_fix-1.patch Log: Added a buffer overflow vulnerability patch for ESP Ghostscript Added: trunk/espgs/espgs-8.15.4-bov_fix-1.patch =================================================================== --- trunk/espgs/espgs-8.15.4-bov_fix-1.patch (rev 0) +++ trunk/espgs/espgs-8.15.4-bov_fix-1.patch 2008-03-25 04:07:54 UTC (rev 1930) @@ -0,0 +1,22 @@ +Submitted By: Randy McMurchy <randy_at_linuxfromscratch_dot_org> +Date: 2008-03-24 +Initial Package Version: 8.15.4 +Upstream Status: In GPL Ghostscript SVN +Origin: http://bugs.gentoo.org/attachment.cgi?id=143467 +Description: Fixes a buffer overflow vulnerability + + +diff -Naur espgs-8.15.4-orig/src/zicc.c espgs-8.15.4/src/zicc.c +--- espgs-8.15.4-orig/src/zicc.c 2005-01-19 04:08:41.000000000 +0000 ++++ espgs-8.15.4/src/zicc.c 2008-03-25 03:56:08.000000000 +0000 +@@ -80,6 +80,9 @@ + dict_find_string(op, "N", &pnval); + ncomps = pnval->value.intval; + ++ if (2*ncomps > sizeof(range_buff)/sizeof(float)) ++ return_error(e_rangecheck); ++ + /* verify the DataSource entry */ + if (dict_find_string(op, "DataSource", &pstrmval) <= 0) + return_error(e_undefined); + -- http://linuxfromscratch.org/mailman/listinfo/patches FAQ: http://www.linuxfromscratch.org/faq/ Unsubscribe: See the above information page
