diff options
author | Narayan Kamath <narayan@google.com> | 2015-02-25 14:33:29 +0000 |
---|---|---|
committer | Narayan Kamath <narayan@google.com> | 2015-02-25 14:41:59 +0000 |
commit | f4435dfcdb5733f9c340492cc7fcac88a13f6ebd (patch) | |
tree | 58bb12d1b9bf8d7d29b887207e92fa87e59e3e5f | |
parent | 31f957bd40b2fd7ce44c5f83be20bc5f39ff9838 (diff) | |
download | libpng-f4435dfcdb5733f9c340492cc7fcac88a13f6ebd.tar.gz |
Restore a width check that was removed from png.c (CVE-2015-0973)android-wear-5.1.1_r1android-wear-5.1.0_r1
Backported from upstream commit 6d8c88177a. Note that this update
from beta3->rc1 contained one other (accidental) change to pngrutil.c
that was subsequently reverted in rc2.
Note that the code around this has moved around and changed quite
a bit since 1.6.10.
bug: 19499430
Change-Id: I303448d2f65ad7dba84e48c3e607dac465ce9f0d
-rw-r--r-- | png.c | 55 |
1 files changed, 44 insertions, 11 deletions
@@ -2421,6 +2421,17 @@ png_colorspace_set_rgb_coefficients(png_structrp png_ptr) #endif /* COLORSPACE */ +#ifdef __GNUC__ +/* This exists solely to work round a warning from GNU C. */ +static int /* PRIVATE */ +png_gt(size_t a, size_t b) +{ + return a > b; +} +#else +# define png_gt(a,b) ((a) > (b)) +#endif + void /* PRIVATE */ png_check_IHDR(png_const_structrp png_ptr, png_uint_32 width, png_uint_32 height, int bit_depth, @@ -2435,24 +2446,51 @@ png_check_IHDR(png_const_structrp png_ptr, png_warning(png_ptr, "Image width is zero in IHDR"); error = 1; } - - if (height == 0) + else if (width > PNG_UINT_31_MAX) { - png_warning(png_ptr, "Image height is zero in IHDR"); + png_warning(png_ptr, "Invalid image width in IHDR"); error = 1; } -# ifdef PNG_SET_USER_LIMITS_SUPPORTED - if (width > png_ptr->user_width_max) + else if (png_gt(width, + (PNG_SIZE_MAX >> 3) /* 8-byte RGBA pixels */ + - 48 /* big_row_buf hack */ + - 1 /* filter byte */ + - 7*8 /* rounding width to multiple of 8 pix */ + - 8)) /* extra max_pixel_depth pad */ + { + /* The size of the row must be within the limits of this architecture. + * Because the read code can perform arbitrary transformations the + * maximum size is checked here. Because the code in png_read_start_row + * adds extra space "for safety's sake" in several places a conservative + * limit is used here. + * + * NOTE: it would be far better to check the size that is actually used, + * but the effect in the real world is minor and the changes are more + * extensive, therefore much more dangerous and much more difficult to + * write in a way that avoids compiler warnings. + */ + png_warning(png_ptr, "Image width is too large for this architecture"); + error = 1; + } +# ifdef PNG_SET_USER_LIMITS_SUPPORTED + else if (width > png_ptr->user_width_max) # else - if (width > PNG_USER_WIDTH_MAX) + else if (width > PNG_USER_WIDTH_MAX) # endif { png_warning(png_ptr, "Image width exceeds user limit in IHDR"); error = 1; } + if (height == 0) + { + png_warning(png_ptr, "Image height is zero in IHDR"); + error = 1; + } + + # ifdef PNG_SET_USER_LIMITS_SUPPORTED if (height > png_ptr->user_height_max) # else @@ -2463,11 +2501,6 @@ png_check_IHDR(png_const_structrp png_ptr, error = 1; } - if (width > PNG_UINT_31_MAX) - { - png_warning(png_ptr, "Invalid image width in IHDR"); - error = 1; - } if (height > PNG_UINT_31_MAX) { |