- security update
- added patches fix CVE-2021-45942 [bsc#1194333], heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute + openexr-CVE-2021-45942.patch OBS-URL: https://build.opensuse.org/package/show/graphics/openexr?expand=0&rev=79
This commit is contained in:
parent
2cfaf38996
commit
4a1b52b0c1
32
openexr-CVE-2021-45942.patch
Normal file
32
openexr-CVE-2021-45942.patch
Normal file
@ -0,0 +1,32 @@
|
||||
diff --git a/src/lib/OpenEXR/ImfDeepScanLineInputFile.cpp b/src/lib/OpenEXR/ImfDeepScanLineInputFile.cpp
|
||||
index 0acbed04b..364a1f04b 100644
|
||||
--- a/src/lib/OpenEXR/ImfDeepScanLineInputFile.cpp
|
||||
+++ b/src/lib/OpenEXR/ImfDeepScanLineInputFile.cpp
|
||||
@@ -1961,14 +1961,20 @@ readSampleCountForLineBlock(InputStreamMutex* streamData,
|
||||
// @TODO refactor the compressor code to ensure full 64-bit support.
|
||||
//
|
||||
|
||||
- int compressorMaxDataSize = std::numeric_limits<int>::max();
|
||||
- if (sampleCountTableDataSize > uint64_t(compressorMaxDataSize))
|
||||
+ uint64_t compressorMaxDataSize = static_cast<uint64_t>(std::numeric_limits<int>::max());
|
||||
+ if (packedDataSize > compressorMaxDataSize ||
|
||||
+ unpackedDataSize > compressorMaxDataSize ||
|
||||
+ sampleCountTableDataSize > compressorMaxDataSize)
|
||||
{
|
||||
- THROW (IEX_NAMESPACE::ArgExc, "This version of the library does not "
|
||||
- << "support the allocation of data with size > "
|
||||
- << compressorMaxDataSize
|
||||
- << " file table size :" << sampleCountTableDataSize << ".\n");
|
||||
+ THROW (IEX_NAMESPACE::ArgExc, "This version of the library does not"
|
||||
+ << "support the allocation of data with size > "
|
||||
+ << compressorMaxDataSize
|
||||
+ << " file table size :" << sampleCountTableDataSize
|
||||
+ << " file unpacked size :" << unpackedDataSize
|
||||
+ << " file packed size :" << packedDataSize << ".\n");
|
||||
}
|
||||
+
|
||||
+
|
||||
streamData->is->read(data->sampleCountTableBuffer, static_cast<int>(sampleCountTableDataSize));
|
||||
|
||||
const char* readPtr;
|
||||
|
@ -1,3 +1,11 @@
|
||||
-------------------------------------------------------------------
|
||||
Wed Jan 5 12:55:27 UTC 2022 - pgajdos@suse.com
|
||||
|
||||
- security update
|
||||
- added patches
|
||||
fix CVE-2021-45942 [bsc#1194333], heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute
|
||||
+ openexr-CVE-2021-45942.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Nov 9 10:15:53 UTC 2021 - pgajdos@suse.com
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
#
|
||||
# spec file for package openexr
|
||||
#
|
||||
# Copyright (c) 2021 SUSE LLC
|
||||
# Copyright (c) 2022 SUSE LLC
|
||||
#
|
||||
# All modifications and additions to the file contributed by third parties
|
||||
# remain the property of their copyright owners, unless otherwise agreed
|
||||
@ -30,6 +30,8 @@ Group: Development/Libraries/C and C++
|
||||
URL: https://www.openexr.com/
|
||||
Source0: https://github.com/openexr/openexr/archive/v%{version}.tar.gz
|
||||
Source2: baselibs.conf
|
||||
# CVE-2021-45942 [bsc#1194333], heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute
|
||||
Patch0: openexr-CVE-2021-45942.patch
|
||||
BuildRequires: cmake >= 3.12
|
||||
BuildRequires: fltk-devel
|
||||
BuildRequires: freeglut-devel
|
||||
|
Loading…
Reference in New Issue
Block a user