|
Message-Id: <20160127054008.4655CB2E019@smtpvbsrv1.mitre.org> Date: Wed, 27 Jan 2016 00:40:08 -0500 (EST) From: cve-assign@...re.org To: xiaoqixue_1@....com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: a bug in gif2rgb.c in giflib-5.1.2 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > We find a memory allocation whose size could be zero in gif2rgb.c. > and It will result to several memory out of bound read and write. the bug in gif2rgb.c:386 : > > 386 if ((ScreenBuffer = (GifRowType *) > 387 malloc(GifFile->SHeight * sizeof(GifRowType))) == NULL) > 388 GIF_EXIT("Failed to allocate memory required, aborted."); > > > Please see "http://sourceforge.net/p/giflib/bugs/82/" for more details. Can you provide more information about the relationship between http://sourceforge.net/p/giflib/bugs/82/ and the above instance of GifFile->SHeight in the malloc call? The http://sourceforge.net/p/giflib/code/ci/4cc68b315ff9a378aef6664e1be6b2144ad4a5e6/ patch for http://sourceforge.net/p/giflib/bugs/82/ adds a check for "GifFile->SWidth == 0" but does not add new validation of the GifFile->SHeight value. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWqFekAAoJEL54rhJi8gl5AtQP/imjqKTZMrt2KiqYaIAiEbvK KBvoKNDaBesh4kJQ2XHIlT+kG5y2Qr0KiXYR3+O0nrbebXzM9pUlcAI6H3jAhiOX h2mRNBXKGOof7wbsoAFsKrYEKAdASvLxy+KSl74Bxb00Z68PSezgBo1SoHi/xW3z C5yFxRnOjYLlVz/X76+gYYqbLgwnLHUPWN4mIxu2unDZ67Mc43i8br4pr1eXH4an 1GgExNhoMsIk2vwPLatOL7DDEqBJKLygVh5QYtXs1uXjBx/RA4opzJRsb3mgmX2D K4q5mjgrUfx85meR/9zBVs22HLSWcJPQoqQnaRHcKKN0R8J0P+31X2NYBqbMj9d3 HVZaaX9zB4Uq3Mpj9ZTgGnvyJuI/YVi7VviYTWhn17NGrvH3ivCr/vvhs7nudBti PfQj6if3vhy6cH7WYUN9ybzG3NXFdPpL9ZU5WN5GAyICXfYo3m63X03OZWPuTm3h skzp2a4dAfh+6KTF53ebUzoi0V+vX3tq5+jnMbDam/UfZBOdq+cK0CYU2VrOmNCj F0LcBDjzGBxepVLQS54Bvh/B5ymrIWjcub4zJ6gIIh0Sg5sUBBW2eg80my5wrD46 7mvpMgl2D2FWy8dHkdyf4abotfnZj62d43XD+tqjfERuTRnJCDNh/O8q4MyMVw73 69PiDuGJuPAhFns58FDN =bNmf -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.