blob: 51edb763891e109c78943f1d734d8a57429ca666 [file] [log] [blame]
Patrick Williams213cb262021-08-07 19:21:33 -05001From 26d3c81bc5ef2f8c3f09d45eaeacfb4b1139a777 Mon Sep 17 00:00:00 2001
2From: Michael Niedermayer <michael@niedermayer.cc>
3Date: Tue, 25 May 2021 19:29:18 +0200
4Subject: [PATCH] avcodec/exr: More strictly check dc_count
5MIME-Version: 1.0
6Content-Type: text/plain; charset=UTF-8
7Content-Transfer-Encoding: 8bit
8
9Fixes: out of array access
10Fixes: exr/deneme
11
12Found-by: Burak Çarıkçı <burakcarikci@crypttech.com>
13Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
14
15
16CVE: CVE-2021-33815
17Upstream-Status: Backport [26d3c81bc5ef2f8c3f09d45eaeacfb4b1139a777]
18
19Signed-off-by: Tony Tascioglu <tony.tascioglu@windriver.com>
20---
21 libavcodec/exr.c | 4 ++--
22 1 file changed, 2 insertions(+), 2 deletions(-)
23
24diff --git a/libavcodec/exr.c b/libavcodec/exr.c
25index 9377a89169..4648ed7d62 100644
26--- a/libavcodec/exr.c
27+++ b/libavcodec/exr.c
28@@ -1059,11 +1059,11 @@ static int dwa_uncompress(EXRContext *s, const uint8_t *src, int compressed_size
29 bytestream2_skip(&gb, ac_size);
30 }
31
32- if (dc_size > 0) {
33+ {
34 unsigned long dest_len = dc_count * 2LL;
35 GetByteContext agb = gb;
36
37- if (dc_count > (6LL * td->xsize * td->ysize + 63) / 64)
38+ if (dc_count != dc_w * dc_h * 3)
39 return AVERROR_INVALIDDATA;
40
41 av_fast_padded_malloc(&td->dc_data, &td->dc_size, FFALIGN(dest_len, 64) * 2);
42--
432.32.0
44