From: Zdenek Hutyra <zhutyra@centrum.cz>
Date: Mon, 20 Jan 2025 16:13:46 +0000
Subject: PDF interpreter - Guard against unsigned int overflow
Origin: https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ef42ff180a04926e187d40faea40d4a43e304e3b
Bug: https://bugs.ghostscript.com/show_bug.cgi?id=708253
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2025-27834

Bug #708253 - see bug report for details.

CVE-2025-27834
---
 pdf/pdf_func.c | 13 +++++++++++++
 1 file changed, 13 insertions(+)

diff --git a/pdf/pdf_func.c b/pdf/pdf_func.c
index 635fdac54f2e..93492c783971 100644
--- a/pdf/pdf_func.c
+++ b/pdf/pdf_func.c
@@ -153,6 +153,9 @@ pdfi_parse_type4_func_stream(pdf_context *ctx, pdf_c_stream *function_stream, in
     byte *p = (ops ? ops + *size : NULL);
 
     while (1) {
+        if (*size > max_uint / 2)
+            return gs_note_error(gs_error_VMerror);
+
         c = pdfi_read_byte(ctx, function_stream);
         if (c < 0)
             break;
@@ -321,6 +324,11 @@ pdfi_build_function_4(pdf_context *ctx, gs_function_params_t * mnDR,
     if (code < 0)
         goto function_4_error;
 
+    if (size > max_uint - 1) {
+        code = gs_note_error(gs_error_VMerror);
+        goto function_4_error;
+    }
+
     ops = gs_alloc_string(ctx->memory, size + 1, "pdfi_build_function_4(ops)");
     if (ops == NULL) {
         code = gs_error_VMerror;
@@ -825,6 +833,11 @@ int pdfi_build_halftone_function(pdf_context *ctx, gs_function_t ** ppfn, byte *
     if (code < 0)
         goto halftone_function_error;
 
+    if (size > max_uint - 1) {
+        code = gs_note_error(gs_error_VMerror);
+        goto halftone_function_error;
+    }
+
     ops = gs_alloc_string(ctx->memory, size + 1, "pdfi_build_halftone_function(ops)");
     if (ops == NULL) {
         code = gs_error_VMerror;
-- 
2.49.0

