summaryrefslogtreecommitdiff
path: root/src/lib
diff options
context:
space:
mode:
authorEven Rouault <even.rouault@spatialys.com>2017-07-26 12:24:26 +0200
committerEven Rouault <even.rouault@spatialys.com>2017-07-26 12:50:51 +0200
commit80818c39f5bfbac37768fcee95b0ffeceaa77264 (patch)
tree0f5a042507f7fa4867a63e68148decf178508b60 /src/lib
parentd27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b (diff)
Avoid index out of bounds access to pi->include[] (#938)
Fix id:000098,sig:11,src:005411,op:havoc,rep:2 test case
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/openjp2/pi.c44
-rw-r--r--src/lib/openjp2/pi.h2
2 files changed, 42 insertions, 4 deletions
diff --git a/src/lib/openjp2/pi.c b/src/lib/openjp2/pi.c
index 798867a8..1aae9d03 100644
--- a/src/lib/openjp2/pi.c
+++ b/src/lib/openjp2/pi.c
@@ -230,6 +230,12 @@ static OPJ_BOOL opj_pi_check_next_level(OPJ_INT32 pos,
==========================================================
*/
+static void opj_pi_emit_error(opj_pi_iterator_t * pi, const char* msg)
+{
+ (void)pi;
+ (void)msg;
+}
+
static OPJ_BOOL opj_pi_next_lrcp(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
@@ -259,6 +265,16 @@ static OPJ_BOOL opj_pi_next_lrcp(opj_pi_iterator_t * pi)
for (pi->precno = pi->poc.precno0; pi->precno < pi->poc.precno1; pi->precno++) {
index = pi->layno * pi->step_l + pi->resno * pi->step_r + pi->compno *
pi->step_c + pi->precno * pi->step_p;
+ /* Avoids index out of bounds access with */
+ /* id_000098,sig_11,src_005411,op_havoc,rep_2 of */
+ /* https://github.com/uclouvain/openjpeg/issues/938 */
+ /* Not sure if this is the most clever fix. Perhaps */
+ /* include should be resized when a POC arises, or */
+ /* the POC should be rejected */
+ if (index >= pi->include_size) {
+ opj_pi_emit_error(pi, "Invalid access to pi->include");
+ return OPJ_FALSE;
+ }
if (!pi->include[index]) {
pi->include[index] = 1;
return OPJ_TRUE;
@@ -301,6 +317,10 @@ static OPJ_BOOL opj_pi_next_rlcp(opj_pi_iterator_t * pi)
for (pi->precno = pi->poc.precno0; pi->precno < pi->poc.precno1; pi->precno++) {
index = pi->layno * pi->step_l + pi->resno * pi->step_r + pi->compno *
pi->step_c + pi->precno * pi->step_p;
+ if (index >= pi->include_size) {
+ opj_pi_emit_error(pi, "Invalid access to pi->include");
+ return OPJ_FALSE;
+ }
if (!pi->include[index]) {
pi->include[index] = 1;
return OPJ_TRUE;
@@ -407,6 +427,10 @@ static OPJ_BOOL opj_pi_next_rpcl(opj_pi_iterator_t * pi)
for (pi->layno = pi->poc.layno0; pi->layno < pi->poc.layno1; pi->layno++) {
index = pi->layno * pi->step_l + pi->resno * pi->step_r + pi->compno *
pi->step_c + pi->precno * pi->step_p;
+ if (index >= pi->include_size) {
+ opj_pi_emit_error(pi, "Invalid access to pi->include");
+ return OPJ_FALSE;
+ }
if (!pi->include[index]) {
pi->include[index] = 1;
return OPJ_TRUE;
@@ -513,6 +537,10 @@ static OPJ_BOOL opj_pi_next_pcrl(opj_pi_iterator_t * pi)
for (pi->layno = pi->poc.layno0; pi->layno < pi->poc.layno1; pi->layno++) {
index = pi->layno * pi->step_l + pi->resno * pi->step_r + pi->compno *
pi->step_c + pi->precno * pi->step_p;
+ if (index >= pi->include_size) {
+ opj_pi_emit_error(pi, "Invalid access to pi->include");
+ return OPJ_FALSE;
+ }
if (!pi->include[index]) {
pi->include[index] = 1;
return OPJ_TRUE;
@@ -617,6 +645,10 @@ static OPJ_BOOL opj_pi_next_cprl(opj_pi_iterator_t * pi)
for (pi->layno = pi->poc.layno0; pi->layno < pi->poc.layno1; pi->layno++) {
index = pi->layno * pi->step_l + pi->resno * pi->step_r + pi->compno *
pi->step_c + pi->precno * pi->step_p;
+ if (index >= pi->include_size) {
+ opj_pi_emit_error(pi, "Invalid access to pi->include");
+ return OPJ_FALSE;
+ }
if (!pi->include[index]) {
pi->include[index] = 1;
return OPJ_TRUE;
@@ -1332,9 +1364,10 @@ opj_pi_iterator_t *opj_pi_create_decode(opj_image_t *p_image,
/* prevent an integer overflow issue */
/* 0 < l_tcp->numlayers < 65536 c.f. opj_j2k_read_cod in j2k.c */
l_current_pi->include = 00;
- if (l_step_l <= (SIZE_MAX / (l_tcp->numlayers + 1U))) {
- l_current_pi->include = (OPJ_INT16*) opj_calloc((size_t)(
- l_tcp->numlayers + 1U) * l_step_l, sizeof(OPJ_INT16));
+ if (l_step_l <= (UINT_MAX / (l_tcp->numlayers + 1U))) {
+ l_current_pi->include_size = (l_tcp->numlayers + 1U) * l_step_l;
+ l_current_pi->include = (OPJ_INT16*) opj_calloc(
+ l_current_pi->include_size, sizeof(OPJ_INT16));
}
if (!l_current_pi->include) {
@@ -1424,6 +1457,7 @@ opj_pi_iterator_t *opj_pi_create_decode(opj_image_t *p_image,
}
/* special treatment*/
l_current_pi->include = (l_current_pi - 1)->include;
+ l_current_pi->include_size = (l_current_pi - 1)->include_size;
++l_current_pi;
}
opj_free(l_tmp_data);
@@ -1525,7 +1559,8 @@ opj_pi_iterator_t *opj_pi_initialise_encode(const opj_image_t *p_image,
l_current_pi = l_pi;
/* memory allocation for include*/
- l_current_pi->include = (OPJ_INT16*) opj_calloc(l_tcp->numlayers * l_step_l,
+ l_current_pi->include_size = l_tcp->numlayers * l_step_l;
+ l_current_pi->include = (OPJ_INT16*) opj_calloc(l_current_pi->include_size,
sizeof(OPJ_INT16));
if (!l_current_pi->include) {
opj_free(l_tmp_data);
@@ -1610,6 +1645,7 @@ opj_pi_iterator_t *opj_pi_initialise_encode(const opj_image_t *p_image,
/* special treatment*/
l_current_pi->include = (l_current_pi - 1)->include;
+ l_current_pi->include_size = (l_current_pi - 1)->include_size;
++l_current_pi;
}
diff --git a/src/lib/openjp2/pi.h b/src/lib/openjp2/pi.h
index a16995bd..cc7f9b00 100644
--- a/src/lib/openjp2/pi.h
+++ b/src/lib/openjp2/pi.h
@@ -75,6 +75,8 @@ typedef struct opj_pi_iterator {
OPJ_BYTE tp_on;
/** precise if the packet has been already used (useful for progression order change) */
OPJ_INT16 *include;
+ /** Number of elements in include array */
+ OPJ_UINT32 include_size;
/** layer step used to localize the packet in the include vector */
OPJ_UINT32 step_l;
/** resolution step used to localize the packet in the include vector */