wpng: fix integer overflow in NetPBM size calculations #780
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
This patch fixes an integer overflow vulnerability in
contrib/gregbook/wpng.cwhen computing image buffer sizes from NetPBM header fields (width,height). Crafted inputs could previously trigger under-allocation followed by an out-of-bounds heap write.Vulnerability Details
wpngderives buffer sizes using arithmetic based on attacker-controlledwidthandheightvalues, for example:rowbytes = width * {1,3,4}image_bytes = rowbytes * heightThese computations were performed without overflow checks. On overflow,
malloc()could allocate a smaller-than-required buffer, whilefread()would still read the (overflowed) size, resulting in heap memory corruption.Both interlaced and non-interlaced decode paths were affected.
Fix
Switched size computations to
size_tAdded explicit overflow checks for:
rowbytesderivationimage_bytescalculationrow_pointersallocation (height * sizeof(pointer))Ensured allocation sizes and
fread()sizes are consistent and validatedMalformed inputs with excessive dimensions are now rejected before allocation or I/O.
Impact
wpngutility when used in automated pipelinesTesting
This change is limited to input validation and does not alter correct behavior for valid files.