-
Notifications
You must be signed in to change notification settings - Fork 0
Comparing changes
Open a pull request
base repository: php-win-ext/libxpm
base: master
head repository: winlibs/libxpm
compare: master
- 6 commits
- 14 files changed
- 3 contributors
Commits on Oct 22, 2024
-
Fix CVE-2022-46285: Infinite loop on unclosed comments
When reading XPM images from a file with libXpm 3.5.14 or older, if a comment in the file is not closed (i.e. a C-style comment starts with "/*" and is missing the closing "*/"), the ParseComment() function will loop forever calling getc() to try to read the rest of the comment, failing to notice that it has returned EOF, which may cause a denial of service to the calling program. Reported-by: Marco Ivaldi <[email protected]> Signed-off-by: Alan Coopersmith <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 663b706 - Browse repository at this point
Copy the full SHA 663b706View commit details -
Fix CVE-2022-44617: Runaway loop with width of 0 and enormous height
When reading XPM images from a file with libXpm 3.5.14 or older, if a image has a width of 0 and a very large height, the ParsePixels() function will loop over the entire height calling getc() and ungetc() repeatedly, or in some circumstances, may loop seemingly forever, which may cause a denial of service to the calling program when given a small crafted XPM file to parse. Closes: winlibs#2 Reported-by: Martin Ettl <[email protected]> Signed-off-by: Alan Coopersmith <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a497318 - Browse repository at this point
Copy the full SHA a497318View commit details -
Prevent a double free in the error code path
xpmParseDataAndCreate() calls XDestroyImage() in the error path. Reproducible with sxpm "zero-width.xpm", that file is in the test/ directory. The same approach is needed in the bytes_per_line == 0 condition though here it just plugs a memory leak. Signed-off-by: Alan Coopersmith <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 581af1b - Browse repository at this point
Copy the full SHA 581af1bView commit details
Commits on Oct 28, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 1856977 - Browse repository at this point
Copy the full SHA 1856977View commit details
Commits on Nov 4, 2024
-
Fix CVE-2023-43788: Out of bounds read in XpmCreateXpmImageFromBuffer
When the test case for CVE-2022-46285 was run with the Address Sanitizer enabled, it found an out-of-bounds read in ParseComment() when reading from a memory buffer instead of a file, as it continued to look for the closing comment marker past the end of the buffer. Signed-off-by: Alan Coopersmith <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2652f0b - Browse repository at this point
Copy the full SHA 2652f0bView commit details -
Fix CVE-2023-43789: Out of bounds read on XPM with corrupted colormap
Found with clang's libfuzzer Signed-off-by: Alan Coopersmith <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8cbfcb3 - Browse repository at this point
Copy the full SHA 8cbfcb3View commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff master...master