Blame SOURCES/file-5.11-CVE-2014-3480.patch

435ea7
From 40ef6e07e0b2cdced57c506e08cf18f47122292d Mon Sep 17 00:00:00 2001
435ea7
From: Remi Collet <remi@php.net>
435ea7
Date: Tue, 10 Jun 2014 14:22:04 +0200
435ea7
Subject: [PATCH] Bug #67412 	fileinfo: cdf_count_chain insufficient
435ea7
 boundary check
435ea7
435ea7
Upstream:
435ea7
https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382
435ea7
---
435ea7
 ext/fileinfo/libmagic/cdf.c | 7 ++++---
435ea7
 1 file changed, 4 insertions(+), 3 deletions(-)
435ea7
435ea7
diff --git a/ext/fileinfo/libmagic/cdf.c b/ext/fileinfo/libmagic/cdf.c
435ea7
index c9a5d50..ee467a6 100644
435ea7
--- a/src/cdf.c
435ea7
+++ b/src/cdf.c
435ea7
@@ -457,7 +457,8 @@ size_t
435ea7
 cdf_count_chain(const cdf_sat_t *sat, cdf_secid_t sid, size_t size)
435ea7
 {
435ea7
 	size_t i, j;
435ea7
-	cdf_secid_t maxsector = (cdf_secid_t)(sat->sat_len * size);
435ea7
+	cdf_secid_t maxsector = (cdf_secid_t)((sat->sat_len * size)
435ea7
+	    / sizeof(maxsector));
435ea7
 
435ea7
 	DPRINTF(("Chain:"));
435ea7
 	for (j = i = 0; sid >= 0; i++, j++) {
435ea7
@@ -467,8 +468,8 @@ cdf_count_chain(const cdf_sat_t *sat, cdf_secid_t sid, size_t size)
435ea7
 			errno = EFTYPE;
435ea7
 			return (size_t)-1;
435ea7
 		}
435ea7
-		if (sid > maxsector) {
435ea7
-			DPRINTF(("Sector %d > %d\n", sid, maxsector));
435ea7
+		if (sid >= maxsector) {
435ea7
+			DPRINTF(("Sector %d >= %d\n", sid, maxsector));
435ea7
 			errno = EFTYPE;
435ea7
 			return (size_t)-1;
435ea7
 		}
435ea7
-- 
435ea7
1.9.2
435ea7