ref: e076a7ad504add6e8c3b8699e8587eef0e0d9bc3
parent: 7b3f30e13e4845bafc93215a372c6eb7dcf04118
author: Mans Rullgard <mans@mansr.com>
date: Sun Nov 5 11:21:23 EST 2017
wav: ima_adpcm: fix buffer overflow on corrupt input (CVE-2017-15370) Add the same check bad block size as was done for MS adpcm in commit f39c574b ("More checks for invalid MS ADPCM blocks").
--- a/src/wav.c
+++ b/src/wav.c
@@ -127,7 +127,7 @@
/* work with partial blocks. Specs say it should be null */
/* padded but I guess this is better than trailing quiet. */
samplesThisBlock = lsx_ima_samples_in((size_t)0, (size_t)ft->signal.channels, bytesRead, (size_t) 0);
- if (samplesThisBlock == 0)
+ if (samplesThisBlock == 0 || samplesThisBlock > wav->samplesPerBlock)
{
lsx_warn("Premature EOF on .wav input file");
return 0;