[PATCH] load_text: prevent overflow on long lines conversion to utf8 (#2386)
authorAurelien David <aurelien.david@telecom-paristech.fr>
Tue, 7 Feb 2023 15:01:42 +0000 (16:01 +0100)
committerMoritz Mühlenhoff <jmm@debian.org>
Mon, 19 Jun 2023 21:46:06 +0000 (22:46 +0100)
Gbp-Pq: Name CVE-2023-1452.patch

src/filters/load_text.c

index 8a103f3930d26831123078789ed69551e0a53337..c8718d3930e65fdb937e7907cd1614eb91fb67a6 100644 (file)
@@ -295,6 +295,12 @@ char *gf_text_get_utf8_line(char *szLine, u32 lineSize, FILE *txt_in, s32 unicod
 
                        szLineConv[j] = szLine[i];
                        j++;
+
+                       if (j >= GF_ARRAY_LENGTH(szLineConv) - 1) {
+                               GF_LOG(GF_LOG_DEBUG, GF_LOG_PARSER, ("[TXTIn] Line too long to convert to utf8 (len: %d)\n", len));
+                               break;
+                       }
+
                }
                 if ( j >= GF_ARRAY_LENGTH(szLineConv) ) {
                         GF_LOG(GF_LOG_DEBUG, GF_LOG_PARSER, ("[TXTIn] Line too long to convert to utf8 (len: %d)\n", len));