Blame SOURCES/exiv2-CVE-2021-29623.patch

e4b251
From 82e46b5524fb904e6660dadd2c6d8e5e47375a1a Mon Sep 17 00:00:00 2001
e4b251
From: Kevin Backhouse <kevinbackhouse@github.com>
e4b251
Date: Tue, 11 May 2021 12:14:33 +0100
e4b251
Subject: [PATCH] Use readOrThrow to check error conditions of iIo.read().
e4b251
e4b251
---
e4b251
 src/webpimage.cpp | 6 +++---
e4b251
 1 file changed, 3 insertions(+), 3 deletions(-)
e4b251
e4b251
diff --git a/src/webpimage.cpp b/src/webpimage.cpp
e4b251
index 7c64ff3d7..ca26e514a 100644
e4b251
--- a/src/webpimage.cpp
e4b251
+++ b/src/webpimage.cpp
e4b251
@@ -754,9 +754,9 @@ namespace Exiv2 {
e4b251
         byte webp[len];
e4b251
         byte data[len];
e4b251
         byte riff[len];
e4b251
-        iIo.read(riff, len);
e4b251
-        iIo.read(data, len);
e4b251
-        iIo.read(webp, len);
e4b251
+        readOrThrow(iIo, riff, len, Exiv2::kerCorruptedMetadata);
e4b251
+        readOrThrow(iIo, data, len, Exiv2::kerCorruptedMetadata);
e4b251
+        readOrThrow(iIo, webp, len, Exiv2::kerCorruptedMetadata);
e4b251
         bool matched_riff = (memcmp(riff, RiffImageId, len) == 0);
e4b251
         bool matched_webp = (memcmp(webp, WebPImageId, len) == 0);
e4b251
         iIo.seek(-12, BasicIo::cur);