From: Andrew Wesie Date: Fri, 16 Oct 2020 11:29:02 +0000 (+0100) Subject: codecparsers: h264parser: guard against ref_pic_markings overflow X-Git-Tag: 1.19.3~507^2~1251 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=11353b3f6e2f047cc37483d21e6a37ae558896bc;p=platform%2Fupstream%2Fgstreamer.git codecparsers: h264parser: guard against ref_pic_markings overflow Part-of: --- diff --git a/gst-libs/gst/codecparsers/gsth264parser.c b/gst-libs/gst/codecparsers/gsth264parser.c index 1c40b65..012f1d0 100644 --- a/gst-libs/gst/codecparsers/gsth264parser.c +++ b/gst-libs/gst/codecparsers/gsth264parser.c @@ -723,13 +723,17 @@ gst_h264_slice_parse_dec_ref_pic_marking (GstH264SliceHdr * slice, dec_ref_pic_m->n_ref_pic_marking = 0; while (1) { - refpicmarking = - &dec_ref_pic_m->ref_pic_marking[dec_ref_pic_m->n_ref_pic_marking]; - READ_UE (nr, mem_mgmt_ctrl_op); if (mem_mgmt_ctrl_op == 0) break; + if (dec_ref_pic_m->n_ref_pic_marking >= + G_N_ELEMENTS (dec_ref_pic_m->ref_pic_marking)) + goto error; + + refpicmarking = + &dec_ref_pic_m->ref_pic_marking[dec_ref_pic_m->n_ref_pic_marking]; + refpicmarking->memory_management_control_operation = mem_mgmt_ctrl_op; if (mem_mgmt_ctrl_op == 1 || mem_mgmt_ctrl_op == 3)