summaryrefslogtreecommitdiff
path: root/CVE-2023-5341.patch
diff options
context:
space:
mode:
authorCoprDistGit <infra@openeuler.org>2024-07-17 08:11:15 +0000
committerCoprDistGit <infra@openeuler.org>2024-07-17 08:11:15 +0000
commita44539adb2dc27000ba5c1ff981bfe5ffbb033ae (patch)
treec102bf69fc2aa25383bbe27fe85ae8aa97edb0e7 /CVE-2023-5341.patch
parent8429034d24ba997d37a0cb0760ba20591b603215 (diff)
automatic import of ImageMagickopeneuler24.03_LTS
Diffstat (limited to 'CVE-2023-5341.patch')
-rw-r--r--CVE-2023-5341.patch27
1 files changed, 27 insertions, 0 deletions
diff --git a/CVE-2023-5341.patch b/CVE-2023-5341.patch
new file mode 100644
index 0000000..5ab101d
--- /dev/null
+++ b/CVE-2023-5341.patch
@@ -0,0 +1,27 @@
+From 97b99a741321c9a89491ebb6dab66d1215413595 Mon Sep 17 00:00:00 2001
+From: Cristy <urban-warrior@imagemagick.org>
+Date: Sat, 7 Oct 2023 10:22:57 +0800
+Subject: [PATCH] check for BMP file size, poc provided by Hardik Shah of
+ Vehere (Dawn Treaders team)
+
+---
+ coders/bmp.c | 3 +++
+ 1 file changed, 3 insertions(+)
+
+diff --git a/coders/bmp.c b/coders/bmp.c
+index 8ff76bb..bb9ce2f 100644
+--- a/coders/bmp.c
++++ b/coders/bmp.c
+@@ -629,6 +629,9 @@ static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception)
+ " BMP header size: %u",bmp_info.size);
+ if (bmp_info.size > 124)
+ ThrowReaderException(CorruptImageError,"ImproperImageHeader");
++ if ((bmp_info.file_size != 0) &&
++ ((MagickSizeType) bmp_info.file_size > GetBlobSize(image)))
++ ThrowReaderException(CorruptImageError,"ImproperImageHeader");
+ if (bmp_info.offset_bits < bmp_info.size)
+ ThrowReaderException(CorruptImageError,"ImproperImageHeader");
+ bmp_info.offset_bits=MagickMax(14+bmp_info.size,bmp_info.offset_bits);
+--
+2.27.0
+