Blame tests/bugfixes/github/test_CVE_2018_9145.py
|
Packit |
01d647 |
# -*- coding: utf-8 -*-
|
|
Packit |
01d647 |
|
|
Packit |
01d647 |
import system_tests
|
|
Packit |
01d647 |
import unittest
|
|
Packit |
01d647 |
|
|
Packit |
01d647 |
@unittest.skip("Skipping test using option -pR (only for Debug mode)")
|
|
Packit |
01d647 |
class SubBoxLengthDataBufAbort(metaclass=system_tests.CaseMeta):
|
|
Packit |
01d647 |
|
|
Packit |
01d647 |
url = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9145"
|
|
Packit |
01d647 |
|
|
Packit |
01d647 |
filename = system_tests.path(
|
|
Packit |
01d647 |
"$data_path/4-DataBuf-abort-1"
|
|
Packit |
01d647 |
)
|
|
Packit |
01d647 |
commands = ["$exiv2 -pR $filename"]
|
|
Packit |
01d647 |
stdout = [
|
|
Packit |
01d647 |
"""STRUCTURE OF JPEG2000 FILE: $filename
|
|
Packit |
01d647 |
address | length | box | data
|
|
Packit |
01d647 |
0 | 12 | jP |
|
|
Packit |
01d647 |
12 | 20 | jp2h |
|
|
Packit |
01d647 |
"""
|
|
Packit |
01d647 |
]
|
|
Packit |
01d647 |
stderr = [
|
|
Packit |
01d647 |
"""$exiv2_exception_message $filename:
|
|
Packit |
01d647 |
$kerCorruptedMetadata
|
|
Packit |
01d647 |
"""
|
|
Packit |
01d647 |
]
|
|
Packit |
01d647 |
retval = [1]
|