fix TS/ES: Integer overflow, stack overflow, heap over-read #1964
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
In raising this pull request, I confirm the following (please check boxes):
My familiarity with the project is as follows (check one):
Description:
This PR addresses three critical and previously unreported vulnerabilities in CCExtractor's TS/ES decoders.
Issue: #1963
Problems fixed:
Integer Overflow in TS PSI buffer (
ts_tables.c)buffer_length + payload_lengthfrom exceeding 1MB.Stack Overflow in SCTE 20 parsing (
es_userdata.c)cc_dataarray.cc_dataarray and added termination for safety.Heap Buffer Over-read in GXF VBI parsing (
es_userdata.c)decode_vbireads 720 bytes unconditionally regardless ofudatalen.udatalen >= 720before callingdecode_vbi.Testing:
Impact:
Prevents heap corruption, stack overflow, and buffer over-read in core decoders. Ensures robustness against malformed TS/ES streams.