shithub: jbig2

Download patch

ref: d379be4ca803bf0bdd43d00b89da320c29d393c4
parent: 3f370a0ffaa5dd8b903b0ee36294529fbf0cbd1f
author: zeniko <[email protected]>
date: Fri Jul 5 09:11:58 EDT 2013

Bug 694111: prevent heap overflow

jbig2_image_compose fails to ensure that the destination rectangle lies
entirely within the destination buffer (in the case of the file
3324.pdf.asan.50.2585, this happens due to a huge value for y). Adding a
new check which makes sure that...

@ y * dst->stride + leftbyte doesn't overflow
@ x and leftbyte don't overflow to the next line
@ h * dst->stride doesn't overflow
@ all values read are within the destination buffer

The file 3324.pdf.asan.50.2585 also demonstrates a memory leak where the
glyph isn't properly released if jbig2_image_compose fails.

--- a/jbig2_image.c
+++ b/jbig2_image.c
@@ -256,9 +256,6 @@
 #endif
 
     leftbyte = x >> 3;
-    if (leftbyte > dst->height * dst->stride)
-        return jbig2_error(ctx, JBIG2_SEVERITY_FATAL, -1,
-            "preventing heap overflow in jbig2_image_compose");
     rightbyte = (x + w - 1) >> 3;
     shift = x & 7;
 
@@ -265,6 +262,11 @@
     /* general OR case */
     s = ss;
     d = dd = dst->data + y*dst->stride + leftbyte;
+    if (d < dst->data || leftbyte > dst->stride || h * dst->stride < 0 ||
+        d - leftbyte + h * dst->stride > dst->data + dst->height * dst->stride) {
+        return jbig2_error(ctx, JBIG2_SEVERITY_FATAL, -1,
+            "preventing heap overflow in jbig2_image_compose");
+    }
     if (leftbyte == rightbyte) {
 	mask = 0x100 - (0x100 >> w);
         for (j = 0; j < h; j++) {
--- a/jbig2_text.c
+++ b/jbig2_text.c
@@ -381,7 +381,10 @@
 		memcpy(rparams.grat, params->sbrat, 4);
 		code = jbig2_decode_refinement_region(ctx, segment,
 		    &rparams, as, refimage, GR_stats);
-		if (code < 0) goto cleanup2;
+		if (code < 0) {
+		    jbig2_image_release(ctx, refimage);
+		    goto cleanup2;
+		}
 		IB = refimage;
 
 		jbig2_image_release(ctx, IBO);
@@ -428,7 +431,10 @@
 			params->SBNUMINSTANCES);
 #endif
 	    code = jbig2_image_compose(ctx, image, IB, x, y, params->SBCOMBOP);
-            if (code < 0) goto cleanup2;
+	    if (code < 0) {
+		jbig2_image_release(ctx, IB);
+		goto cleanup2;
+	    }
 
 	    /* (3c.x) */
 	    if ((!params->TRANSPOSED) && (params->REFCORNER < 2)) {