diff options
author | CoprDistGit <infra@openeuler.org> | 2024-07-17 08:11:15 +0000 |
---|---|---|
committer | CoprDistGit <infra@openeuler.org> | 2024-07-17 08:11:15 +0000 |
commit | a44539adb2dc27000ba5c1ff981bfe5ffbb033ae (patch) | |
tree | c102bf69fc2aa25383bbe27fe85ae8aa97edb0e7 /CVE-2023-5341.patch | |
parent | 8429034d24ba997d37a0cb0760ba20591b603215 (diff) |
automatic import of ImageMagickopeneuler24.03_LTS
Diffstat (limited to 'CVE-2023-5341.patch')
-rw-r--r-- | CVE-2023-5341.patch | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/CVE-2023-5341.patch b/CVE-2023-5341.patch new file mode 100644 index 0000000..5ab101d --- /dev/null +++ b/CVE-2023-5341.patch @@ -0,0 +1,27 @@ +From 97b99a741321c9a89491ebb6dab66d1215413595 Mon Sep 17 00:00:00 2001 +From: Cristy <urban-warrior@imagemagick.org> +Date: Sat, 7 Oct 2023 10:22:57 +0800 +Subject: [PATCH] check for BMP file size, poc provided by Hardik Shah of + Vehere (Dawn Treaders team) + +--- + coders/bmp.c | 3 +++ + 1 file changed, 3 insertions(+) + +diff --git a/coders/bmp.c b/coders/bmp.c +index 8ff76bb..bb9ce2f 100644 +--- a/coders/bmp.c ++++ b/coders/bmp.c +@@ -629,6 +629,9 @@ static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception) + " BMP header size: %u",bmp_info.size); + if (bmp_info.size > 124) + ThrowReaderException(CorruptImageError,"ImproperImageHeader"); ++ if ((bmp_info.file_size != 0) && ++ ((MagickSizeType) bmp_info.file_size > GetBlobSize(image))) ++ ThrowReaderException(CorruptImageError,"ImproperImageHeader"); + if (bmp_info.offset_bits < bmp_info.size) + ThrowReaderException(CorruptImageError,"ImproperImageHeader"); + bmp_info.offset_bits=MagickMax(14+bmp_info.size,bmp_info.offset_bits); +-- +2.27.0 + |