Browse Source

More on bug #54682 - check for the end offset overflowing too

git-svn-id: https://svn.apache.org/repos/asf/poi/trunk@1487558 13f79535-47bb-0310-9956-ffa450edef68
tags/3.10-beta1
Nick Burch 11 years ago
parent
commit
1a2591a8c1

+ 5
- 3
src/scratchpad/src/org/apache/poi/hwpf/model/UnhandledDataStructure.java View File

@@ -34,10 +34,12 @@ public final class UnhandledDataStructure
public UnhandledDataStructure(byte[] buf, int offset, int length)
{
// Sanity check the size they've asked for
if (offset + length > buf.length)
int offsetEnd = offset + length;
if (offsetEnd > buf.length || offsetEnd < 0)
{
throw new IndexOutOfBoundsException("Buffer Length is " + buf.length + " " +
"but code is tried to read " + length + " from offset " + offset);
"but code is tried to read " + length + " " +
"from offset " + offset + " to " + offsetEnd);
}
if (offset < 0 || length < 0)
{
@@ -46,7 +48,7 @@ public final class UnhandledDataStructure
}
// Save that requested portion of the data
_buf = Arrays.copyOfRange(buf, offset, offset + length);
_buf = Arrays.copyOfRange(buf, offset, offsetEnd);
}

byte[] getBuf()

Loading…
Cancel
Save