Skip to content

Commit

Permalink
ID3: check possible integer overflow for extendedHeaderSize and paddi…
Browse files Browse the repository at this point in the history
…ngSize.

Ticket: CYNGNOS-1299
Bug: 24623447
Change-Id: Ifbc74454d6e28ad7136efe35ab638a07e46398b1
(cherry picked from commit b3694ff)
(cherry picked from commit 7ed8d1e)
  • Loading branch information
Wei Jia authored and Jessica Wagantall committed Dec 8, 2015
1 parent 09ac69b commit 92d92ff
Showing 1 changed file with 19 additions and 2 deletions.
21 changes: 19 additions & 2 deletions media/libstagefright/id3/ID3.cpp
Expand Up @@ -194,6 +194,13 @@ struct id3_header {

if (header.version_major == 4) {
void *copy = malloc(size);
if (copy == NULL) {
free(mData);
mData = NULL;
ALOGE("b/24623447, no more memory");
return false;
}

memcpy(copy, mData, size);

bool success = removeUnsynchronizationV2_4(false /* iTunesHack */);
Expand Down Expand Up @@ -234,7 +241,14 @@ struct id3_header {
return false;
}

size_t extendedHeaderSize = U32_AT(&mData[0]) + 4;
size_t extendedHeaderSize = U32_AT(&mData[0]);
if (extendedHeaderSize > SIZE_MAX - 4) {
free(mData);
mData = NULL;
ALOGE("b/24623447, extendedHeaderSize is too large");
return false;
}
extendedHeaderSize += 4;

if (extendedHeaderSize > mSize) {
free(mData);
Expand All @@ -252,7 +266,10 @@ struct id3_header {
if (extendedHeaderSize >= 10) {
size_t paddingSize = U32_AT(&mData[6]);

if (mFirstFrameOffset + paddingSize > mSize) {
if (paddingSize > SIZE_MAX - mFirstFrameOffset) {
ALOGE("b/24623447, paddingSize is too large");
}
if (paddingSize > mSize - mFirstFrameOffset) {
free(mData);
mData = NULL;

Expand Down

0 comments on commit 92d92ff

Please sign in to comment.