!102 fix CVE-2023-39328

From: @xinghe_1 
Reviewed-by: @weidongkl 
Signed-off-by: @weidongkl
This commit is contained in:
openeuler-ci-bot 2024-07-11 07:56:51 +00:00 committed by Gitee
commit f18beff8e7
No known key found for this signature in database
GPG Key ID: 173E9B9CA92EEF8F
2 changed files with 40 additions and 1 deletions

View File

@ -0,0 +1,32 @@
From b287b27a87ecfbbd3b1206b17269d19e76a1b467 Mon Sep 17 00:00:00 2001
From: pic4xiu <40382944+pic4xiu@users.noreply.github.com>
Date: Thu, 29 Jun 2023 19:50:47 +0800
Subject: [PATCH] Update opj_malloc.c
Conflict: NA
Reference: https://github.com/uclouvain/openjpeg/commit/b287b27a87ecfbbd3b1206b17269d19e76a1b467
---
src/lib/openjp2/opj_malloc.c | 10 ++++++++++
1 file changed, 10 insertions(+)
diff --git a/src/lib/openjp2/opj_malloc.c b/src/lib/openjp2/opj_malloc.c
index dca91bfcb..6242614f9 100644
--- a/src/lib/openjp2/opj_malloc.c
+++ b/src/lib/openjp2/opj_malloc.c
@@ -197,6 +197,16 @@ void * opj_malloc(size_t size)
}
void * opj_calloc(size_t num, size_t size)
{
+ static unsigned long long allocated_size = 0;
+ static unsigned long long max_allocated_size = 4ULL * 1024 * 1024 * 1024;
+ /*Restrict this function can only malloc 4GB of memory*/
+
+ unsigned long long total_size = (unsigned long long)(num * size);
+ allocated_size += total_size;
+ if (allocated_size > max_allocated_size) {
+ /*Prevent excessive resource allocation*/
+ return NULL;
+ }
if (num == 0 || size == 0) {
/* prevent implementation defined behavior of realloc */
return NULL;

View File

@ -1,6 +1,6 @@
Name: openjpeg2
Version: 2.3.1
Release: 11
Release: 12
Summary: C-Library for JPEG 2000
License: BSD and MIT
URL: https://github.com/uclouvain/openjpeg
@ -26,6 +26,7 @@ Patch6014: backport-0001-CVE-2019-12973.patch
Patch6015: backport-0002-CVE-2019-12973.patch
Patch6016: backport-CVE-2021-3575.patch
Patch6017: backport-CVE-2022-1122.patch
Patch6018: backport-CVE-2023-39328.patch
BuildRequires: cmake gcc-c++ make zlib-devel libpng-devel libtiff-devel lcms2-devel doxygen
@ -102,6 +103,12 @@ mv %{buildroot}%{_mandir}/man1/opj_dump.1 %{buildroot}%{_mandir}/man1/opj2_dump.
%{_mandir}/man3/*.3*
%changelog
* Thu Jul 11 2024 xinghe <xinghe2@h-partners.com> - 2.3.1-12
- Type:cves
- ID:CVE-2023-39328
- SUG:NA
- DESC:fix CVE-2023-39328
* Mon May 16 2022 dongyuzhen <dongyuzhen@h-partners.com> - 2.3.1-11
- fix CVE-2022-1122