Blame SOURCES/0222-video-readers-png-Refuse-to-handle-multiple-image-he.patch

1c6ba0
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
1c6ba0
From: Daniel Axtens <dja@axtens.net>
1c6ba0
Date: Tue, 6 Jul 2021 14:13:40 +1000
1c6ba0
Subject: [PATCH] video/readers/png: Refuse to handle multiple image headers
1c6ba0
1c6ba0
This causes the bitmap to be leaked. Do not permit multiple image headers.
1c6ba0
1c6ba0
Signed-off-by: Daniel Axtens <dja@axtens.net>
1c6ba0
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
1c6ba0
(cherry picked from commit 8ce433557adeadbc46429aabb9f850b02ad2bdfb)
1c6ba0
---
1c6ba0
 grub-core/video/readers/png.c | 3 +++
1c6ba0
 1 file changed, 3 insertions(+)
1c6ba0
1c6ba0
diff --git a/grub-core/video/readers/png.c b/grub-core/video/readers/png.c
1c6ba0
index e2a6b1cf3c..8955b8ecfd 100644
1c6ba0
--- a/grub-core/video/readers/png.c
1c6ba0
+++ b/grub-core/video/readers/png.c
1c6ba0
@@ -258,6 +258,9 @@ grub_png_decode_image_header (struct grub_png_data *data)
1c6ba0
   int color_bits;
1c6ba0
   enum grub_video_blit_format blt;
1c6ba0
 
1c6ba0
+  if (data->image_width || data->image_height)
1c6ba0
+    return grub_error (GRUB_ERR_BAD_FILE_TYPE, "png: two image headers found");
1c6ba0
+
1c6ba0
   data->image_width = grub_png_get_dword (data);
1c6ba0
   data->image_height = grub_png_get_dword (data);
1c6ba0