avformat/dvbsub: Fix hypothetical pointer overflow in dvbsub_probe()
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
This commit is contained in:
@@ -37,7 +37,7 @@ static int dvbsub_probe(AVProbeData *p)
|
|||||||
const uint8_t *ptr = p->buf + i;
|
const uint8_t *ptr = p->buf + i;
|
||||||
uint8_t histogram[6] = {0};
|
uint8_t histogram[6] = {0};
|
||||||
int min = 255;
|
int min = 255;
|
||||||
for(j=0; ptr + 6 < end; j++) {
|
for(j=0; 6 < end - ptr; j++) {
|
||||||
if (*ptr != 0x0f)
|
if (*ptr != 0x0f)
|
||||||
break;
|
break;
|
||||||
type = ptr[1];
|
type = ptr[1];
|
||||||
@@ -49,6 +49,8 @@ static int dvbsub_probe(AVProbeData *p)
|
|||||||
histogram[type - 0x10] ++;
|
histogram[type - 0x10] ++;
|
||||||
} else
|
} else
|
||||||
break;
|
break;
|
||||||
|
if (6 + len > end - ptr)
|
||||||
|
break;
|
||||||
ptr += 6 + len;
|
ptr += 6 + len;
|
||||||
}
|
}
|
||||||
for (k=0; k < 4; k++) {
|
for (k=0; k < 4; k++) {
|
||||||
|
Reference in New Issue
Block a user