mirror of
https://git.code.sf.net/p/libpng/code.git
synced 2025-07-10 18:04:09 +02:00
[libpng16] Check for integer overflow in contrib/tools/genpng.
This commit is contained in:
@@ -1,7 +1,8 @@
|
||||
/*- genpng
|
||||
*
|
||||
* COPYRIGHT: Written by John Cunningham Bowler, 2015.
|
||||
* To the extent possible under law, the author has waived all copyright and
|
||||
* Revised by Glenn Randers-Pehrson, 2017, to add buffer-size check.
|
||||
* To the extent possible under law, the authors have waived all copyright and
|
||||
* related or neighboring rights to this work. This work is published from:
|
||||
* United States.
|
||||
*
|
||||
@@ -783,6 +784,19 @@ main(int argc, const char **argv)
|
||||
return 1;
|
||||
}
|
||||
|
||||
#if 1
|
||||
/* TO do: determine whether this guard against overflow is necessary.
|
||||
* This comment in png.h indicates that it should be safe: "libpng will
|
||||
* refuse to process an image where such an overflow would occur", but
|
||||
* I don't see where the image gets rejected when the buffer is too
|
||||
* large before the malloc is attempted.
|
||||
*/
|
||||
if (image.height > ((size_t)(-1))/(8*image.width)) {
|
||||
fprintf(stderr, "genpng: image buffer would be too big");
|
||||
return 1;
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Create the buffer: */
|
||||
buffer = malloc(PNG_IMAGE_SIZE(image));
|
||||
|
||||
|
||||
Reference in New Issue
Block a user