Fix int overflow

This commit is contained in:
Pavel Zhukov 2017-05-03 15:11:13 +02:00
parent b863cf622a
commit ff9ab41638
3 changed files with 37 additions and 2658 deletions

View File

@ -0,0 +1,31 @@
From f8992b8fe65c170c8624226f127c5c4bfed42c66 Mon Sep 17 00:00:00 2001
From: Shailesh Mistry <shailesh.mistry@hotmail.co.uk>
Date: Wed, 26 Apr 2017 22:12:14 +0100
Subject: [PATCH] Bug 697693: Prevent SEGV due to integer overflow.
While building a Huffman table, the start and end points were susceptible
to integer overflow.
Thank you to Jiaqi for finding this issue and suggesting a patch.
---
jbig2_huffman.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/jbig2_huffman.c b/jbig2_huffman.c
index 511e461..b4189a1 100644
--- a/jbig2_huffman.c
+++ b/jbig2_huffman.c
@@ -421,8 +421,8 @@ jbig2_build_huffman_table(Jbig2Ctx *ctx, const Jbig2HuffmanParams *params)
if (PREFLEN == CURLEN) {
int RANGELEN = lines[CURTEMP].RANGELEN;
- int start_j = CURCODE << shift;
- int end_j = (CURCODE + 1) << shift;
+ uint32_t start_j = CURCODE << shift;
+ uint32_t end_j = (CURCODE + 1) << shift;
byte eflags = 0;
if (end_j > max_j) {
--
2.9.3

View File

@ -1,13 +1,13 @@
Name: jbig2dec
Version: 0.13
Release: 1%{?dist}
Release: 2%{?dist}
Summary: A decoder implementation of the JBIG2 image compression format
Group: System Environment/Libraries
License: GPLv2
URL: http://jbig2dec.sourceforge.net/
Source0: http://ghostscript.com/~giles/jbig2/jbig2dec/%{name}-%{version}.tar.gz
Patch0: %{name}_arm64.patch
Patch1: 0001-Bug-697693-Prevent-SEGV-due-to-integer-overflow.patch
BuildRequires: libtool
%description
@ -48,7 +48,7 @@ which requires the jbig2dec library.
%prep
%setup -q
##%patch0 -p1
%patch1 -p1
%build
@ -85,6 +85,9 @@ rm -f %{buildroot}%{_libdir}/*.la
%changelog
* Wed May 3 2017 Pavel Zhukov <pzhukov@redhat.com> - 0.13-2
- Prevent segserv due to int overflow
* Tue Mar 07 2017 Pavel Zhukov <landgraf@fedoraproject.org> - 0.13-1
- New release 0.13

File diff suppressed because it is too large Load Diff