Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE
GraphicsMagick.8728
GraphicsMagick-CVE-2016-7101.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File GraphicsMagick-CVE-2016-7101.patch of Package GraphicsMagick.8728
Index: GraphicsMagick-1.3.25/coders/sgi.c =================================================================== --- GraphicsMagick-1.3.25.orig/coders/sgi.c 2016-09-05 21:20:23.000000000 +0200 +++ GraphicsMagick-1.3.25/coders/sgi.c 2016-11-29 15:48:55.816935334 +0100 @@ -299,6 +299,8 @@ static Image *ReadSGIImage(const ImageIn size_t bytes_per_pixel; + size_t count; + /* Open image file. */ @@ -332,12 +334,16 @@ static Image *ReadSGIImage(const ImageIn (void) ReadBlob(image,(unsigned int) sizeof(iris_info.dummy1), iris_info.dummy1); - (void) ReadBlob(image,(unsigned int) sizeof(iris_info.image_name), - iris_info.image_name); + count=ReadBlob(image,(unsigned int) sizeof(iris_info.image_name), + iris_info.image_name); + if (count != sizeof(iris_info.image_name)) + ThrowReaderException(CorruptImageError,ImproperImageHeader,image); iris_info.image_name[sizeof(iris_info.image_name)-1]=0; iris_info.color_map=ReadBlobMSBLong(image); - (void) ReadBlob(image,(unsigned int) sizeof(iris_info.dummy2), - iris_info.dummy2); + count=ReadBlob(image,(unsigned int) sizeof(iris_info.dummy2), + iris_info.dummy2); + if (count != sizeof(iris_info.dummy2)) + ThrowReaderException(CorruptImageError,ImproperImageHeader,image); (void) LogMagickEvent(CoderEvent,GetMagickModule(), " Header: Storage=%u, BPC=%u, Dimension=%u, "
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor