Description: Add check for buffer overflow with malformed input files This was later re-found and became CVE-2014-8123. Author: Bug-Debian: http://bugs.debian.org/407015 Bug-Debian: https://bugs.debian.org/771768 Forwarded: http://seclists.org/oss-sec/2014/q4/870 Last-Update: 2016-01-11 --- antiword-0.37~/wordole.c 2005-08-26 21:49:57.000000000 +0200 +++ antiword-0.37/wordole.c 2009-06-03 22:31:15.948014682 +0200 @@ -259,6 +259,10 @@ } tNameSize = (size_t)usGetWord(0x40, aucBytes); tNameSize = (tNameSize + 1) / 2; + if ( tNameSize > sizeof(atPPSlist[iIndex].szName)) { + werr(0, "Name Size of PPS %d is too large", iIndex); + tNameSize = sizeof(atPPSlist[iIndex].szName); + } vName2String(atPPSlist[iIndex].szName, aucBytes, tNameSize); atPPSlist[iIndex].ucType = ucGetByte(0x42, aucBytes); if (atPPSlist[iIndex].ucType == 5) { > Wojtek's customized Guix
aboutsummaryrefslogtreecommitdiff
path: root/tests/bournish.scm
3c429b36706c3b29d4128c&showmsg=1'>Expand)
AgeCommit message (Expand)Author
Author
2021-10-09disarchive-manifest: Provide valid 'version' string....* etc/disarchive-manifest.scm <top level>: Turn 'version' field into a string. Ludovic Courtès
2021-09-14etc: Add 'disarchive-manifest.scm'....* etc/disarchive-manifest.scm: New file. * Makefile.am (EXTRA_DIST): Add it. Ludovic Courtès