diff options
author | Max Rees <maxcrees@me.com> | 2019-07-23 19:33:20 -0400 |
---|---|---|
committer | Max Rees <maxcrees@me.com> | 2019-07-23 19:33:20 -0400 |
commit | 0dec8e672d9f4dcf03494c0a85b4296ea30c56b7 (patch) | |
tree | a168abf9dff1242ba15a08b08c5c5730596ac5b8 /user/atril/CVE-2019-1010006.patch | |
parent | b0c732dec4e83b2f18cb2cd323373b7247a6f2d3 (diff) | |
download | packages-0dec8e672d9f4dcf03494c0a85b4296ea30c56b7.tar.gz packages-0dec8e672d9f4dcf03494c0a85b4296ea30c56b7.tar.bz2 packages-0dec8e672d9f4dcf03494c0a85b4296ea30c56b7.tar.xz packages-0dec8e672d9f4dcf03494c0a85b4296ea30c56b7.zip |
user/atril: patch for CVE-2019-1010006
Diffstat (limited to 'user/atril/CVE-2019-1010006.patch')
-rw-r--r-- | user/atril/CVE-2019-1010006.patch | 56 |
1 files changed, 56 insertions, 0 deletions
diff --git a/user/atril/CVE-2019-1010006.patch b/user/atril/CVE-2019-1010006.patch new file mode 100644 index 000000000..ce107d193 --- /dev/null +++ b/user/atril/CVE-2019-1010006.patch @@ -0,0 +1,56 @@ +From e02fe9170ad0ac2fd46c75329c4f1d4502d4a362 Mon Sep 17 00:00:00 2001 +From: Jason Crain <jcrain@src.gnome.org> +Date: Sat, 2 Dec 2017 20:24:33 -0600 +Subject: [PATCH] Fix overflow checks in tiff backend + +The overflow checks in tiff_document_render and +tiff_document_get_thumbnail don't work when optimizations are enabled. +Change the checks so they don't rely on undefined behavior. + +https://bugzilla.gnome.org/show_bug.cgi?id=788980 +--- + backend/tiff/tiff-document.c | 12 ++++++------ + 1 file changed, 6 insertions(+), 6 deletions(-) + +diff --git a/backend/tiff/tiff-document.c b/backend/tiff/tiff-document.c +index 8f40934e..7bf95c2b 100644 +--- a/backend/tiff/tiff-document.c ++++ b/backend/tiff/tiff-document.c +@@ -284,12 +284,12 @@ tiff_document_render (EvDocument *document, + return NULL; + } + +- bytes = height * rowstride; +- if (bytes / rowstride != height) { ++ if (height >= INT_MAX / rowstride) { + g_warning("Overflow while rendering document."); + /* overflow */ + return NULL; + } ++ bytes = height * rowstride; + + pixels = g_try_malloc (bytes); + if (!pixels) { +@@ -374,15 +374,15 @@ tiff_document_get_thumbnail (EvDocument *document, + if (width <= 0 || height <= 0) + return NULL; + +- rowstride = width * 4; +- if (rowstride / 4 != width) ++ if (width >= INT_MAX / 4) + /* overflow */ + return NULL; ++ rowstride = width * 4; + +- bytes = height * rowstride; +- if (bytes / rowstride != height) ++ if (height >= INT_MAX / rowstride) + /* overflow */ + return NULL; ++ bytes = height * rowstride; + + pixels = g_try_malloc (bytes); + if (!pixels) +-- +2.21.0 + |