giflib: apply patch for CVE-2019-15133 and set CVE_PRODUCT

Backport upstream patch for CVE-2019-15133.
Set CVE_PRODUCT to "giflib_project:giflib" which is used
in NVD. https://nvd.nist.gov/vuln/detail/CVE-2019-15133

Signed-off-by: Mikko Rapeli <mikko.rapeli@bmw.de>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
This commit is contained in:
Mikko Rapeli 2021-01-15 12:54:37 +02:00 committed by Armin Kuster
parent 52967af423
commit 80c0a5fff6
2 changed files with 29 additions and 1 deletions

View File

@ -0,0 +1,23 @@
From 799eb6a3af8a3dd81e2429bf11a72a57e541f908 Mon Sep 17 00:00:00 2001
From: "Eric S. Raymond" <esr@thyrsus.com>
Date: Sun, 17 Mar 2019 12:37:21 -0400
Subject: [PATCH] Address SF bug #119: MemorySanitizer: FPE on unknown address
---
dgif_lib.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Upstream-status: Backport [https://sourceforge.net/p/giflib/code/ci/799eb6a3af8a3dd81e2429bf11a72a57e541f908/]
CVE: CVE-2019-15133
--- a/lib/dgif_lib.c 2021-01-13 19:28:18.923493586 +0100
+++ b/lib/dgif_lib.c 2021-01-13 19:28:55.245863085 +0100
@@ -1099,7 +1099,7 @@ DGifSlurp(GifFileType *GifFile)
sp = &GifFile->SavedImages[GifFile->ImageCount - 1];
/* Allocate memory for the image */
- if (sp->ImageDesc.Width < 0 && sp->ImageDesc.Height < 0 &&
+ if (sp->ImageDesc.Width <= 0 && sp->ImageDesc.Height <= 0 &&
sp->ImageDesc.Width > (INT_MAX / sp->ImageDesc.Height)) {
return GIF_ERROR;
}

View File

@ -3,7 +3,12 @@ SECTION = "libs"
LICENSE = "MIT"
LIC_FILES_CHKSUM = "file://COPYING;md5=ae11c61b04b2917be39b11f78d71519a"
SRC_URI = "${SOURCEFORGE_MIRROR}/giflib/${BP}.tar.bz2"
SRC_URI = " \
${SOURCEFORGE_MIRROR}/giflib/${BP}.tar.bz2 \
file://CVE-2019-15133.patch \
"
CVE_PRODUCT = "giflib_project:giflib"
inherit autotools