blob: 4f8c543214862c4b769c7a30175f532e5ff4ce25 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
|
From 7f4cfaec643863fcdc260da46af8d6581974101d Mon Sep 17 00:00:00 2001
From: mancha <mancha1@hush.com>
Date: Mon, 19 Aug 2013
Subject: CVE-2013-4244
* tools/gif2tiff.c: fix possible OOB write (#2452, CVE-2013-4244)
---
gif2tiff.c | 4 ++++
1 file changed, 4 insertions(+)
--- a/tools/gif2tiff.c 2013-08-20
+++ b/tools/gif2tiff.c 2013-08-20
@@ -396,6 +398,10 @@ process(register int code, unsigned char
}
if (oldcode == -1) {
+ if (code >= clear) {
+ fprintf(stderr, "bad input: code=%d is larger than clear=%d\n",code, clear);
+ return 0;
+ }
*(*fill)++ = suffix[code];
firstchar = oldcode = code;
return 1;
|