diff options
author | Natanael Copa <ncopa@alpinelinux.org> | 2015-01-30 09:22:48 +0000 |
---|---|---|
committer | Natanael Copa <ncopa@alpinelinux.org> | 2015-01-30 09:29:18 +0000 |
commit | b53e06d83f6743f8a5b6a7bac9893af4033d27be (patch) | |
tree | 8e42cfa607dabe27bfaa469800673b059309eff4 /main/antiword/CVE-2014-8123.patch | |
parent | 6285fa299ce16c6502150c257935bfdbc3aaf5d9 (diff) | |
download | aports-b53e06d83f6743f8a5b6a7bac9893af4033d27be.tar.bz2 aports-b53e06d83f6743f8a5b6a7bac9893af4033d27be.tar.xz |
main/antiword: security fix for CVE-2014-8123
ref #3784
Diffstat (limited to 'main/antiword/CVE-2014-8123.patch')
-rw-r--r-- | main/antiword/CVE-2014-8123.patch | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/main/antiword/CVE-2014-8123.patch b/main/antiword/CVE-2014-8123.patch new file mode 100644 index 0000000000..48a752bb64 --- /dev/null +++ b/main/antiword/CVE-2014-8123.patch @@ -0,0 +1,28 @@ +From a17e48746d7203f91a2c3bb1cdcbe9023c8d37a0 Mon Sep 17 00:00:00 2001 +From: Fabian Keil <fk () fabiankeil de> +Date: Tue, 25 Nov 2014 18:58:52 +0100 +Subject: [PATCH] bGetPPS(): Prevent overflow of atPPSlist[].szName[] + +--- + wordole.c | 5 +++++ + 1 file changed, 5 insertions(+) + +diff --git a/wordole.c b/wordole.c +index 8a95fb9..7797d1f 100644 +--- a/wordole.c ++++ b/wordole.c +@@ -259,6 +259,11 @@ bGetPPS(FILE *pFile, + } + tNameSize = (size_t)usGetWord(0x40, aucBytes); + tNameSize = (tNameSize + 1) / 2; ++ if (tNameSize >= sizeof(atPPSlist[0].szName)) { ++ werr(0, "PPS %d appears to be invalid.", iIndex); ++ atPPSlist = xfree(atPPSlist); ++ return FALSE; ++ } + vName2String(atPPSlist[iIndex].szName, aucBytes, tNameSize); + atPPSlist[iIndex].ucType = ucGetByte(0x42, aucBytes); + if (atPPSlist[iIndex].ucType == 5) { +-- +2.1.2 + |