Summary: | buffer overflow | ||
---|---|---|---|
Product: | Ghostscript | Reporter: | Wolfgang Hamann <hamann.w> |
Component: | General | Assignee: | Default assignee <ghostpdl-bugs> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | jackie.rosen |
Priority: | P4 | ||
Version: | 8.62 | ||
Hardware: | PC | ||
OS: | Linux | ||
Customer: | Word Size: | --- | |
Attachments: |
problem_case
patch |
Description
Wolfgang Hamann
2008-12-22 07:13:22 UTC
Please attach the file using the "Create a New Attachment" link in the bug form (http://bugs.ghostscript.com/attachment.cgi?bugid=690211&action=enter) If you don't wish to share the file, you are welcome to "Edit" the attachment after uploading it to mark it "Private" in which case only Artifex Software staff will be able to access the file, and we will treat it as confidential. Created attachment 4668 [details]
problem_case
Created attachment 4669 [details]
patch
There's indeed a buffer overflow caused by an incorrect calculation of the
buffer
size. The patch allocates sufficient buffer for the worst case.
The patch is committed as a rev. 3904. Regression testing shows no differences. Running our regression testing with -D_FORTIFY_SOURCE=2 reports no other errors. |