utvideodec: Prevent possible signed overflow

Doing slice_end - slice_start is unsafe and can lead to undefined behavior
until slice_end has been properly sanitized.

Reviewed-by: Ronald S. Bultje <rsbultje@gmail.com>
Signed-off-by: Ganesh Ajjanagadde <gajjanag@gmail.com>
Signed-off-by: Luca Barbato <lu_zero@gentoo.org>
pull/272/head
Ganesh Ajjanagadde 9 years ago committed by Luca Barbato
parent 4d4d7cf9d5
commit 1fe858136b
  1. 4
      libavcodec/utvideodec.c

@ -361,12 +361,12 @@ static int decode_frame(AVCodecContext *avctx, void *data, int *got_frame,
slice_end = 0; slice_end = 0;
for (j = 0; j < c->slices; j++) { for (j = 0; j < c->slices; j++) {
slice_end = bytestream2_get_le32u(&gb); slice_end = bytestream2_get_le32u(&gb);
slice_size = slice_end - slice_start; if (slice_end < 0 || slice_end < slice_start ||
if (slice_end < 0 || slice_size < 0 ||
bytestream2_get_bytes_left(&gb) < slice_end) { bytestream2_get_bytes_left(&gb) < slice_end) {
av_log(avctx, AV_LOG_ERROR, "Incorrect slice size\n"); av_log(avctx, AV_LOG_ERROR, "Incorrect slice size\n");
return AVERROR_INVALIDDATA; return AVERROR_INVALIDDATA;
} }
slice_size = slice_end - slice_start;
slice_start = slice_end; slice_start = slice_end;
max_slice_size = FFMAX(max_slice_size, slice_size); max_slice_size = FFMAX(max_slice_size, slice_size);
} }

Loading…
Cancel
Save