mirror of
https://github.com/FFmpeg/FFmpeg.git
synced 2024-12-23 12:43:46 +02:00
avcodec/dvdsub_parser: Allocate input padding
Fixes: out of array read Fixes: 9350/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_DVDSUB_fuzzer-5746777750765568 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
This commit is contained in:
parent
2e6ea39386
commit
cd86b5cfe2
@ -57,7 +57,11 @@ static int dvdsub_parse(AVCodecParserContext *s,
|
|||||||
if (pc->packet_len == 0) /* HD-DVD subpicture packet */
|
if (pc->packet_len == 0) /* HD-DVD subpicture packet */
|
||||||
pc->packet_len = AV_RB32(buf+2);
|
pc->packet_len = AV_RB32(buf+2);
|
||||||
av_freep(&pc->packet);
|
av_freep(&pc->packet);
|
||||||
pc->packet = av_malloc(pc->packet_len);
|
if ((unsigned)pc->packet_len > INT_MAX - AV_INPUT_BUFFER_PADDING_SIZE) {
|
||||||
|
av_log(avctx, AV_LOG_ERROR, "packet length %d is invalid\n", pc->packet_len);
|
||||||
|
return buf_size;
|
||||||
|
}
|
||||||
|
pc->packet = av_malloc(pc->packet_len + AV_INPUT_BUFFER_PADDING_SIZE);
|
||||||
}
|
}
|
||||||
if (pc->packet) {
|
if (pc->packet) {
|
||||||
if (pc->packet_index + buf_size <= pc->packet_len) {
|
if (pc->packet_index + buf_size <= pc->packet_len) {
|
||||||
|
Loading…
Reference in New Issue
Block a user