]> granicus.if.org Git - php/commitdiff
remove the huge test file, generate it on the fly instead
authorAnatol Belski <ab@php.net>
Tue, 21 Jun 2016 07:42:38 +0000 (09:42 +0200)
committerAnatol Belski <ab@php.net>
Tue, 21 Jun 2016 07:48:11 +0000 (09:48 +0200)
ext/gd/tests/bug72339.gd [deleted file]
ext/gd/tests/bug72339.phpt

diff --git a/ext/gd/tests/bug72339.gd b/ext/gd/tests/bug72339.gd
deleted file mode 100644 (file)
index 0634c99..0000000
Binary files a/ext/gd/tests/bug72339.gd and /dev/null differ
index 763ae71000a681eb0a67056906b2b623c0fb1114..2c30ee8a74e2ebfc23173791176c41d6b962b44a 100644 (file)
@@ -3,7 +3,29 @@ Bug #72339 Integer Overflow in _gd2GetHeader() resulting in heap overflow
 --SKIPIF--
 <?php if (!function_exists("imagecreatefromgd2")) print "skip"; ?>
 --FILE--
-<?php imagecreatefromgd2(dirname(__FILE__) . DIRECTORY_SEPARATOR . "bug72339.gd"); ?>
+<?php
+$fname = dirname(__FILE__) . DIRECTORY_SEPARATOR . "bug72339.gd";
+
+$fh = fopen($fname, "w");
+fwrite($fh, "gd2\x00");
+fwrite($fh, pack("n", 2));
+fwrite($fh, pack("n", 1));
+fwrite($fh, pack("n", 1));
+fwrite($fh, pack("n", 0x40));
+fwrite($fh, pack("n", 2));
+fwrite($fh, pack("n", 0x5AA0)); // Chunks Wide
+fwrite($fh, pack("n", 0x5B00)); // Chunks Vertically
+fwrite($fh, str_repeat("\x41\x41\x41\x41", 0x1000000)); // overflow data
+fclose($fh);
+
+$im = imagecreatefromgd2($fname);
+
+if ($im) {
+       imagedestroy($im);
+}
+unlink($fname);
+
+?>
 --EXPECTF--    
 Warning: imagecreatefromgd2(): gd warning: product of memory allocation multiplication would exceed INT_MAX, failing operation gracefully
  in %sbug72339.php on line %d