diff options
author | Matthias Clasen <mclasen@redhat.com> | 2015-12-05 16:35:30 -0500 |
---|---|---|
committer | Matthias Clasen <mclasen@redhat.com> | 2015-12-14 07:02:22 -0500 |
commit | 83b50400a938c648ea6f4469ef306caffeca05fb (patch) | |
tree | 77c030eca898b78bc3ee175ecccaaa2c35a0d6f8 | |
parent | 075bc1b08a64a064edc4890454a108680f23f798 (diff) | |
download | gdk-pixbuf-83b50400a938c648ea6f4469ef306caffeca05fb.tar.gz |
bmp: Reject impossible palette size
bmp headers contain separate fields for the number of colors,
and the bit depth. Catch the impossible n_colors > 1 << depth
and error early, before it causes a out-of-bounds memory
access when decoding the colormap.
https://bugzilla.gnome.org/show_bug.cgi?id=758991
-rw-r--r-- | gdk-pixbuf/io-bmp.c | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/gdk-pixbuf/io-bmp.c b/gdk-pixbuf/io-bmp.c index 5c30bfbba..f412997eb 100644 --- a/gdk-pixbuf/io-bmp.c +++ b/gdk-pixbuf/io-bmp.c @@ -325,6 +325,7 @@ static gboolean DecodeHeader(unsigned char *BFH, unsigned char *BIH, GDK_PIXBUF_ERROR_CORRUPT_IMAGE, _("BMP image has unsupported depth")); State->read_state = READ_STATE_ERROR; + return FALSE; } if (State->Header.size == 12) @@ -332,6 +333,16 @@ static gboolean DecodeHeader(unsigned char *BFH, unsigned char *BIH, else clrUsed = (int) (BIH[35] << 24) + (BIH[34] << 16) + (BIH[33] << 8) + (BIH[32]); + if (clrUsed > (1 << State->Header.depth)) + { + g_set_error_literal (error, + GDK_PIXBUF_ERROR, + GDK_PIXBUF_ERROR_CORRUPT_IMAGE, + _("BMP image has oversize palette")); + State->read_state = READ_STATE_ERROR; + return FALSE; + } + if (clrUsed != 0) State->Header.n_colors = clrUsed; else |