ed67fe
From 357fef8b4bd076e3a15e7ffc58a475626794c7e3 Mon Sep 17 00:00:00 2001
ed67fe
From: Lumir Balhar <lbalhar@redhat.com>
ed67fe
Date: Fri, 9 Apr 2021 19:41:58 +0200
ed67fe
Subject: [PATCH 4/4] CVE-2021-27921_27922_27923
ed67fe
ed67fe
---
ed67fe
 src/PIL/BlpImagePlugin.py  | 1 +
ed67fe
 src/PIL/IcnsImagePlugin.py | 2 ++
ed67fe
 src/PIL/IcoImagePlugin.py  | 1 +
ed67fe
 3 files changed, 4 insertions(+)
ed67fe
ed67fe
diff --git a/src/PIL/BlpImagePlugin.py b/src/PIL/BlpImagePlugin.py
ed67fe
index ec358db..d56d46c 100644
ed67fe
--- a/src/PIL/BlpImagePlugin.py
ed67fe
+++ b/src/PIL/BlpImagePlugin.py
ed67fe
@@ -362,6 +362,7 @@ class BLP1Decoder(_BLPBaseDecoder):
ed67fe
         data = jpeg_header + data
ed67fe
         data = BytesIO(data)
ed67fe
         image = JpegImageFile(data)
ed67fe
+        Image._decompression_bomb_check(image.size)
ed67fe
         self.tile = image.tile  # :/
ed67fe
         self.fd = image.fp
ed67fe
         self.mode = image.mode
ed67fe
diff --git a/src/PIL/IcnsImagePlugin.py b/src/PIL/IcnsImagePlugin.py
ed67fe
index b382a73..2292584 100644
ed67fe
--- a/src/PIL/IcnsImagePlugin.py
ed67fe
+++ b/src/PIL/IcnsImagePlugin.py
ed67fe
@@ -110,6 +110,7 @@ def read_png_or_jpeg2000(fobj, start_length, size):
ed67fe
     if sig[:8] == b'\x89PNG\x0d\x0a\x1a\x0a':
ed67fe
         fobj.seek(start)
ed67fe
         im = PngImagePlugin.PngImageFile(fobj)
ed67fe
+        Image._decompression_bomb_check(im.size)
ed67fe
         return {"RGBA": im}
ed67fe
     elif sig[:4] == b'\xff\x4f\xff\x51' \
ed67fe
             or sig[:4] == b'\x0d\x0a\x87\x0a' \
ed67fe
@@ -122,6 +123,7 @@ def read_png_or_jpeg2000(fobj, start_length, size):
ed67fe
         jp2kstream = fobj.read(length)
ed67fe
         f = io.BytesIO(jp2kstream)
ed67fe
         im = Jpeg2KImagePlugin.Jpeg2KImageFile(f)
ed67fe
+        Image._decompression_bomb_check(im.size)
ed67fe
         if im.mode != 'RGBA':
ed67fe
             im = im.convert('RGBA')
ed67fe
         return {"RGBA": im}
ed67fe
diff --git a/src/PIL/IcoImagePlugin.py b/src/PIL/IcoImagePlugin.py
ed67fe
index 2b6d1e0..30412ad 100644
ed67fe
--- a/src/PIL/IcoImagePlugin.py
ed67fe
+++ b/src/PIL/IcoImagePlugin.py
ed67fe
@@ -164,6 +164,7 @@ class IcoFile(object):
ed67fe
         if data[:8] == PngImagePlugin._MAGIC:
ed67fe
             # png frame
ed67fe
             im = PngImagePlugin.PngImageFile(self.buf)
ed67fe
+            Image._decompression_bomb_check(im.size)
ed67fe
         else:
ed67fe
             # XOR + AND mask bmp frame
ed67fe
             im = BmpImagePlugin.DibImageFile(self.buf)
ed67fe
-- 
ed67fe
2.30.2
ed67fe