summaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorEirik Aavitsland <eirik.aavitsland@qt.io>2020-09-17 16:34:12 +0200
committerEirik Aavitsland <eirik.aavitsland@qt.io>2020-09-18 09:37:46 +0200
commit6f2c7469f86785e6ba81fe0280210ef7275099de (patch)
treeb5ca8f1bf0115ad1806f2c697bb3a750e92d2fc2 /src
parent679ec56d9543079748a0deea6205a636d23bd685 (diff)
xpm handler: fix read error caused by off-by-one in overflow check
The recently introduced overflow check for 8 bit images was too aggressive, causing the last pixel on each line to be rejected. As a driveby, add the same (fixed) overflow check also for 32bit images. Pick-to: 5.15 5.12 Fixes: QTBUG-86691 Change-Id: I62e4d5884e314f1171cb5a3e2c48657ce7259676 Reviewed-by: Volker Hilsheimer <volker.hilsheimer@qt.io>
Diffstat (limited to 'src')
-rw-r--r--src/gui/image/qxpmhandler.cpp4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/gui/image/qxpmhandler.cpp b/src/gui/image/qxpmhandler.cpp
index 1211266721..258ff318f5 100644
--- a/src/gui/image/qxpmhandler.cpp
+++ b/src/gui/image/qxpmhandler.cpp
@@ -976,7 +976,7 @@ static bool read_xpm_body(
} else {
char b[16];
b[cpp] = '\0';
- for (x=0; x<w && d+cpp<end; x++) {
+ for (x = 0; x < w && d + cpp <= end; x++) {
memcpy(b, (char *)d, cpp);
*p++ = (uchar)colorMap[xpmHash(b)];
d += cpp;
@@ -994,7 +994,7 @@ static bool read_xpm_body(
int x;
char b[16];
b[cpp] = '\0';
- for (x=0; x<w && d<end; x++) {
+ for (x = 0; x < w && d + cpp <= end; x++) {
memcpy(b, (char *)d, cpp);
*p++ = (QRgb)colorMap[xpmHash(b)];
d += cpp;