Security fix for CVE-2014-2892, heap-based buffer overflow

This commit is contained in:
jasper 2014-05-22 11:53:36 +00:00
parent f776d36af0
commit 6e0861d267
3 changed files with 21 additions and 5 deletions

View File

@ -1,11 +1,11 @@
# $OpenBSD: Makefile,v 1.9 2013/03/21 08:46:33 ajacoutot Exp $
# $OpenBSD: Makefile,v 1.10 2014/05/22 11:53:36 jasper Exp $
COMMENT = library for parsing mms:// and mmsh:// type network streams
DISTNAME = libmms-0.6.2
CATEGORIES = multimedia net
MASTER_SITES = ${MASTER_SITE_SOURCEFORGE:=libmms/}
REVISION= 0
REVISION= 1
SHARED_LIBS = mms 1.0 #0.2

View File

@ -1,5 +1,2 @@
MD5 (libmms-0.6.2.tar.gz) = n2OqNj3rSHTgcqRYUBYb/w==
RMD160 (libmms-0.6.2.tar.gz) = wb+J90YOwgircYBRDbs2c9Z96lo=
SHA1 (libmms-0.6.2.tar.gz) = ze9i/RoOJYXdIRH8lLAy+EKQ41E=
SHA256 (libmms-0.6.2.tar.gz) = AZMbYhctfXBQ/J75sbZBYvO26fbMRBUXAZKjKgt+pDI=
SIZE (libmms-0.6.2.tar.gz) = 340230

View File

@ -0,0 +1,19 @@
$OpenBSD: patch-src_mmsh_c,v 1.1 2014/05/22 11:53:36 jasper Exp $
Security fix for CVE-2014-2892, heap-based buffer overflow
http://sourceforge.net/p/libmms/code/ci/03bcfccc22919c72742b7338d02859962861e0e8
--- src/mmsh.c.orig Thu May 22 13:47:18 2014
+++ src/mmsh.c Thu May 22 13:48:30 2014
@@ -307,7 +307,10 @@ static int get_answer (mms_io_t *io, mmsh_t *this) {
len = 0;
}
} else {
- len ++;
+ if (++len >= sizeof(this->buf)) {
+ lprintf("answer too large\n");
+ return 0;
+ }
}
}
if (this->stream_type == MMSH_UNKNOWN) {