diff options
author | Michael Niedermayer <michael@niedermayer.cc> | 2024-03-29 03:35:18 +0100 |
---|---|---|
committer | Michael Niedermayer <michael@niedermayer.cc> | 2024-04-01 18:17:28 +0200 |
commit | d6ed6f6e8dffcf777c336869f56002da588e2de8 (patch) | |
tree | 3b73cbd779121ed8599e69cef53073808e2b5373 /libavformat/mxfdec.c | |
parent | 7b7eea8e63f761a0d0611d15c24170e40c62402c (diff) | |
download | ffmpeg-d6ed6f6e8dffcf777c336869f56002da588e2de8.tar.gz |
avformat/mxfdec: Check first case of offset_temp computation for overflow
This is kind of ugly
Fixes: signed integer overflow: 255 * 1157565362826411919 cannot be represented in type 'long'
Fixes: 67313/clusterfuzz-testcase-minimized-ffmpeg_dem_MXF_fuzzer-6250434245230592
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
Diffstat (limited to 'libavformat/mxfdec.c')
-rw-r--r-- | libavformat/mxfdec.c | 8 |
1 files changed, 6 insertions, 2 deletions
diff --git a/libavformat/mxfdec.c b/libavformat/mxfdec.c index 456c84e996..e484db052e 100644 --- a/libavformat/mxfdec.c +++ b/libavformat/mxfdec.c @@ -1892,9 +1892,13 @@ static int mxf_edit_unit_absolute_offset(MXFContext *mxf, MXFIndexTable *index_t if (edit_unit < s->index_start_position + s->index_duration) { int64_t index = edit_unit - s->index_start_position; - if (s->edit_unit_byte_count) + if (s->edit_unit_byte_count) { + if (index > INT64_MAX / s->edit_unit_byte_count || + s->edit_unit_byte_count * index > INT64_MAX - offset_temp) + return AVERROR_INVALIDDATA; + offset_temp += s->edit_unit_byte_count * index; - else { + } else { if (s->nb_index_entries == 2 * s->index_duration + 1) index *= 2; /* Avid index */ |