summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTobias Stoeckmann <tobias@stoeckmann.org>2017-02-19 15:58:14 +0100
committerKim Woelders <kim@woelders.dk>2017-02-20 21:03:36 +0100
commit993911b6e5af7936d6da317aa5e2d9eee2cacfb1 (patch)
treef3d5ed68adbadfd0d973374e5e896f08f1b89fd6
parent1f96129e2cda61b245f033f9c881a6f7a90c809e (diff)
downloadimlib2-993911b6e5af7936d6da317aa5e2d9eee2cacfb1.tar.gz
Avoid out of boundary operations while parsing xpm
It is possible to trigger out of boundary read and write accesses while parsing XPM files. 1. If the color definition is shorter than the specified cpp, i.e. characters per pixel, an out of boundary write can be triggered. The write will modify stack memory and could therefore be used to corrupt local variables or return addresses. 2. If the pixel area contains less than the required amount of characters per pixel, an out of boundary read can be triggered. This affects files with more than one character per pixel. 3. If an out of memory condition occurs, a null pointer dereference can be triggered because the variable line is reallocated if not enough memory was available. Dereferencing line with an offset would lead to yet another out of boundary write, which will lead to a segmentation fault on almost every system out there.
-rw-r--r--src/modules/loaders/loader_xpm.c28
1 files changed, 24 insertions, 4 deletions
diff --git a/src/modules/loaders/loader_xpm.c b/src/modules/loaders/loader_xpm.c
index 5379a2f..412a1bd 100644
--- a/src/modules/loaders/loader_xpm.c
+++ b/src/modules/loaders/loader_xpm.c
@@ -202,7 +202,7 @@ load(ImlibImage * im, ImlibProgressFunction progress, char progress_granularity,
if ((cpp > 5) || (cpp < 1))
{
fprintf(stderr,
- "IMLIB ERROR: XPM files with characters per pixel > 5 or < 1not supported\n");
+ "IMLIB ERROR: XPM files with characters per pixel > 5 or < 1 not supported\n");
free(line);
fclose(f);
xpm_parse_done();
@@ -277,6 +277,14 @@ load(ImlibImage * im, ImlibProgressFunction progress, char progress_granularity,
col[0] = 0;
s[0] = 0;
len = strlen(line);
+ if (len < cpp)
+ {
+ free(cmap);
+ free(line);
+ fclose(f);
+ xpm_parse_done();
+ return 0;
+ }
strncpy(cmap[j].str, line, cpp);
cmap[j].str[cpp] = 0;
cmap[j].r = -1;
@@ -415,7 +423,8 @@ load(ImlibImage * im, ImlibProgressFunction progress, char progress_granularity,
#define CM2_G() (unsigned char)cmap[lookup[col[0] - ' '][col[1] - ' ']].g
#define CM2_B() (unsigned char)cmap[lookup[col[0] - ' '][col[1] - ' ']].b
for (i = 0;
- ((i < 65536) && (ptr < end) && (line[i])); i++)
+ ((i < 65536) && (ptr < end)
+ && (line[i]) && (line[i + 1])); i++)
{
col[0] = line[i++];
col[1] = line[i];
@@ -438,7 +447,7 @@ load(ImlibImage * im, ImlibProgressFunction progress, char progress_granularity,
for (i = 0;
((i < 65536) && (ptr < end) && (line[i])); i++)
{
- for (j = 0; j < cpp; j++, i++)
+ for (j = 0; ((j < cpp) && (line[i])); j++, i++)
{
col[j] = line[i];
}
@@ -506,8 +515,19 @@ load(ImlibImage * im, ImlibProgressFunction progress, char progress_granularity,
if (i >= lsz)
{
+ char *nline;
+
lsz += 256;
- line = realloc(line, lsz);
+ nline = realloc(line, lsz);
+ if (nline == NULL)
+ {
+ free(cmap);
+ free(line);
+ fclose(f);
+ xpm_parse_done();
+ return 0;
+ }
+ line = nline;
}
if ((context > 1) && (count >= pixels))