Blame SOURCES/autotrace-0.31.1-CVE-2019-19004.patch

b40ea7
diff -urN autotrace-0.31.1.old/input-bmp.c autotrace-0.31.1/input-bmp.c
b40ea7
--- autotrace-0.31.1.old/input-bmp.c	2021-04-30 15:03:16.264446518 +0530
b40ea7
+++ autotrace-0.31.1/input-bmp.c	2021-04-30 15:06:14.682051209 +0530
b40ea7
@@ -220,6 +220,13 @@
b40ea7
    * word length (32 bits == 4 bytes)
b40ea7
    */
b40ea7
 
b40ea7
+  unsigned long overflowTest = Bitmap_Head.biWidth * Bitmap_Head.biBitCnt;
b40ea7
+  if (overflowTest / Bitmap_Head.biWidth != Bitmap_Head.biBitCnt) {
b40ea7
+    LOG("Error reading BMP file header. Width is too large\n");
b40ea7
+    at_exception_fatal(&exp, "Error reading BMP file header. Width is too large");
b40ea7
+    goto cleanup;
b40ea7
+  }
b40ea7
+
b40ea7
   rowbytes= ( (Bitmap_Head.biWidth * Bitmap_Head.biBitCnt - 1) / 32) * 4 + 4;  
b40ea7
 
b40ea7
 #ifdef DEBUG