diff options
author | Andrew D'Addesio <modchipv12@gmail.com> | 2017-12-02 11:36:25 -0600 |
---|---|---|
committer | Rostislav Pehlivanov <atomnuker@gmail.com> | 2017-12-04 07:28:45 +0000 |
commit | 511e6f17f493719058229630c7db4d8d7c05aeac (patch) | |
tree | 6c32a2167d779e5045fcd54523ffd3ae6edd5f40 | |
parent | 9b45bcf713e0bc30fff7d1e6c2facb539c27ec28 (diff) | |
download | ffmpeg-511e6f17f493719058229630c7db4d8d7c05aeac.tar.gz |
opus_silk: Fix arithmetic overflow (per RFC8251)
As per Sec.6 of RFC8251:
Integer Wrap-Around in Inverse Gain Computation
32-bit integer overflow in Levinson recursion. Affects
silk_is_lpc_stable().
Signed-off-by: Andrew D'Addesio <modchipv12@gmail.com>
-rw-r--r-- | libavcodec/opus_silk.c | 11 |
1 files changed, 9 insertions, 2 deletions
diff --git a/libavcodec/opus_silk.c b/libavcodec/opus_silk.c index 3c9c849c21..344333cc18 100644 --- a/libavcodec/opus_silk.c +++ b/libavcodec/opus_silk.c @@ -185,8 +185,15 @@ static inline int silk_is_lpc_stable(const int16_t lpc[16], int order) row = lpc32[k & 1]; for (j = 0; j < k; j++) { - int x = prevrow[j] - ROUND_MULL(prevrow[k - j - 1], rc, 31); - row[j] = ROUND_MULL(x, gain, fbits); + int x = av_sat_sub32(prevrow[j], ROUND_MULL(prevrow[k - j - 1], rc, 31)); + int64_t tmp = ROUND_MULL(x, gain, fbits); + + /* per RFC 8251 section 6, if this calculation overflows, the filter + is considered unstable. */ + if (tmp < INT32_MIN || tmp > INT32_MAX) + return 0; + + row[j] = (int32_t)tmp; } } } |