ar: hopefully fix out-of-bounds read in get_header_ar()
authorDenys Vlasenko <vda.linux@googlemail.com>
Tue, 6 Feb 2018 16:39:45 +0000 (17:39 +0100)
committerDenys Vlasenko <vda.linux@googlemail.com>
Tue, 6 Feb 2018 16:39:45 +0000 (17:39 +0100)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882175

Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
archival/libarchive/get_header_ar.c

index 1809ec39672ab1dfee3c5d9cdddf7ccc78b2bb0b..93e071c9f128284b6510668620241ffe6efec960 100644 (file)
@@ -83,7 +83,7 @@ char FAST_FUNC get_header_ar(archive_handle_t *archive_handle)
                         */
                        ar_long_name_size = size;
                        free(ar_long_names);
-                       ar_long_names = xmalloc(size);
+                       ar_long_names = xzalloc(size + 1);
                        xread(archive_handle->src_fd, ar_long_names, size);
                        archive_handle->offset += size;
                        /* Return next header */
@@ -107,7 +107,7 @@ char FAST_FUNC get_header_ar(archive_handle_t *archive_handle)
                unsigned long_offset;
 
                /* The number after the '/' indicates the offset in the ar data section
-                * (saved in ar_long_names) that conatains the real filename */
+                * (saved in ar_long_names) that contains the real filename */
                long_offset = read_num(&ar.formatted.name[1], 10,
                                       sizeof(ar.formatted.name) - 1);
                if (long_offset >= ar_long_name_size) {