From: Debian Qt/KDE Maintainers Date: Wed, 19 Aug 2020 17:40:32 +0000 (+0100) Subject: fix buffer overflow in XBM parser X-Git-Tag: archive/raspbian/5.14.2+dfsg-6+rpi1^2~12 X-Git-Url: https://dgit.raspbian.org/%22http://www.example.com/cgi/success/%22http:/www.example.com/cgi/success?a=commitdiff_plain;h=c881a20c18dafce1bb366be10e9853c54c388c50;p=qtbase-opensource-src.git fix buffer overflow in XBM parser Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=1616c71921b73b22 Last-Update: 2020-08-18 Gbp-Pq: Name CVE-2020-17507.diff --- diff --git a/src/gui/image/qxbmhandler.cpp b/src/gui/image/qxbmhandler.cpp index 3cd15b3e4..355cae548 100644 --- a/src/gui/image/qxbmhandler.cpp +++ b/src/gui/image/qxbmhandler.cpp @@ -159,7 +159,9 @@ static bool read_xbm_body(QIODevice *device, int w, int h, QImage *outImage) w = (w+7)/8; // byte width while (y < h) { // for all encoded bytes... - if (p) { // p = "0x.." + if (p && p < (buf + readBytes - 3)) { // p = "0x.." + if (!isxdigit(p[2]) || !isxdigit(p[3])) + return false; *b++ = hex2byte(p+2); p += 2; if (++x == w && ++y < h) {