video/readers: Add artificial limit to image dimensions
In grub-core/video/readers/jpeg.c, the height and width of a JPEG image don't have an upper limit for how big the JPEG image can be. In Coverity, this is getting flagged as an untrusted loop bound. This issue can also seen in PNG and TGA format images as well but Coverity isn't flagging it. To prevent this, the constant IMAGE_HW_MAX_PX is being added to include/grub/bitmap.h, which has a value of 16384, to act as an artificial limit and restrict the height and width of images. This value was picked as it is double the current max resolution size, which is 8K. Fixes: CID 292450 Signed-off-by: Alec Brown <alec.r.brown@oracle.com> Reviewed-by: Darren Kenny <darren.kenny@oracle.com> Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
This commit is contained in:
parent
2a5e3c1f2a
commit
a85714545f
@ -1515,7 +1515,8 @@ resolution. @xref{gfxmode}.
|
||||
Set a background image for use with the @samp{gfxterm} graphical terminal.
|
||||
The value of this option must be a file readable by GRUB at boot time, and
|
||||
it must end with @file{.png}, @file{.tga}, @file{.jpg}, or @file{.jpeg}.
|
||||
The image will be scaled if necessary to fit the screen.
|
||||
The image will be scaled if necessary to fit the screen. Image height and
|
||||
width will be restricted by an artificial limit of 16384.
|
||||
|
||||
@item GRUB_THEME
|
||||
Set a theme for use with the @samp{gfxterm} graphical terminal.
|
||||
|
||||
@ -346,7 +346,11 @@ grub_jpeg_decode_sof (struct grub_jpeg_data *data)
|
||||
data->image_height = grub_jpeg_get_word (data);
|
||||
data->image_width = grub_jpeg_get_word (data);
|
||||
|
||||
if ((!data->image_height) || (!data->image_width))
|
||||
grub_dprintf ("jpeg", "image height: %d\n", data->image_height);
|
||||
grub_dprintf ("jpeg", "image width: %d\n", data->image_width);
|
||||
|
||||
if ((!data->image_height) || (!data->image_width) ||
|
||||
(data->image_height > IMAGE_HW_MAX_PX) || (data->image_width > IMAGE_HW_MAX_PX))
|
||||
return grub_error (GRUB_ERR_BAD_FILE_TYPE, "jpeg: invalid image size");
|
||||
|
||||
cc = grub_jpeg_get_byte (data);
|
||||
|
||||
@ -264,7 +264,11 @@ grub_png_decode_image_header (struct grub_png_data *data)
|
||||
data->image_width = grub_png_get_dword (data);
|
||||
data->image_height = grub_png_get_dword (data);
|
||||
|
||||
if ((!data->image_height) || (!data->image_width))
|
||||
grub_dprintf ("png", "image height: %d\n", data->image_height);
|
||||
grub_dprintf ("png", "image width: %d\n", data->image_width);
|
||||
|
||||
if ((!data->image_height) || (!data->image_width) ||
|
||||
(data->image_height > IMAGE_HW_MAX_PX) || (data->image_width > IMAGE_HW_MAX_PX))
|
||||
return grub_error (GRUB_ERR_BAD_FILE_TYPE, "png: invalid image size");
|
||||
|
||||
color_bits = grub_png_get_byte (data);
|
||||
|
||||
@ -340,6 +340,13 @@ grub_video_reader_tga (struct grub_video_bitmap **bitmap,
|
||||
data.image_width = grub_le_to_cpu16 (data.hdr.image_width);
|
||||
data.image_height = grub_le_to_cpu16 (data.hdr.image_height);
|
||||
|
||||
grub_dprintf ("tga", "image height: %d\n", data.image_height);
|
||||
grub_dprintf ("tga", "image width: %d\n", data.image_width);
|
||||
|
||||
/* Check image height and width are within restrictions. */
|
||||
if ((data.image_height > IMAGE_HW_MAX_PX) || (data.image_width > IMAGE_HW_MAX_PX))
|
||||
return grub_error (GRUB_ERR_BAD_FILE_TYPE, "tga: invalid image size");
|
||||
|
||||
/* Check that bitmap encoding is supported. */
|
||||
switch (data.hdr.image_type)
|
||||
{
|
||||
|
||||
@ -24,6 +24,8 @@
|
||||
#include <grub/types.h>
|
||||
#include <grub/video.h>
|
||||
|
||||
#define IMAGE_HW_MAX_PX 16384
|
||||
|
||||
struct grub_video_bitmap
|
||||
{
|
||||
/* Bitmap format description. */
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user