Blame SOURCES/0003-CVE-2019-7574-Fix-a-buffer-overread-in-IMA_ADPCM_dec.patch

a19bfa
From 4b3fd03718c9f929e32292e3dfd0c97db7a17bc9 Mon Sep 17 00:00:00 2001
a19bfa
From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= <ppisar@redhat.com>
a19bfa
Date: Mon, 10 Jun 2019 08:50:59 -0700
a19bfa
Subject: [PATCH 03/11] CVE-2019-7574: Fix a buffer overread in
a19bfa
 IMA_ADPCM_decode If data chunk was shorter than expected based on a WAV
a19bfa
 format definition, IMA_ADPCM_decode() tried to read past the data chunk
a19bfa
 buffer. This patch fixes it.
a19bfa
MIME-Version: 1.0
a19bfa
Content-Type: text/plain; charset=UTF-8
a19bfa
Content-Transfer-Encoding: 8bit
a19bfa
a19bfa
CVE-2019-7574
a19bfa
https://bugzilla.libsdl.org/show_bug.cgi?id=4496
a19bfa
a19bfa
Signed-off-by: Petr Písař <ppisar@redhat.com>
a19bfa
a19bfa
--HG--
a19bfa
branch : SDL-1.2
a19bfa
---
a19bfa
 src/audio/SDL_wave.c | 9 ++++++++-
a19bfa
 1 file changed, 8 insertions(+), 1 deletion(-)
a19bfa
a19bfa
diff --git a/src/audio/SDL_wave.c b/src/audio/SDL_wave.c
a19bfa
index 21ee4dc3c..66f804421 100644
a19bfa
--- a/src/audio/SDL_wave.c
a19bfa
+++ b/src/audio/SDL_wave.c
a19bfa
@@ -331,7 +331,7 @@ static void Fill_IMA_ADPCM_block(Uint8 *decoded, Uint8 *encoded,
a19bfa
 static int IMA_ADPCM_decode(Uint8 **audio_buf, Uint32 *audio_len)
a19bfa
 {
a19bfa
 	struct IMA_ADPCM_decodestate *state;
a19bfa
-	Uint8 *freeable, *encoded, *decoded;
a19bfa
+	Uint8 *freeable, *encoded, *encoded_end, *decoded;
a19bfa
 	Sint32 encoded_len, samplesleft;
a19bfa
 	unsigned int c, channels;
a19bfa
 
a19bfa
@@ -347,6 +347,7 @@ static int IMA_ADPCM_decode(Uint8 **audio_buf, Uint32 *audio_len)
a19bfa
 	/* Allocate the proper sized output buffer */
a19bfa
 	encoded_len = *audio_len;
a19bfa
 	encoded = *audio_buf;
a19bfa
+	encoded_end = encoded + encoded_len;
a19bfa
 	freeable = *audio_buf;
a19bfa
 	*audio_len = (encoded_len/IMA_ADPCM_state.wavefmt.blockalign) * 
a19bfa
 				IMA_ADPCM_state.wSamplesPerBlock*
a19bfa
@@ -362,6 +363,7 @@ static int IMA_ADPCM_decode(Uint8 **audio_buf, Uint32 *audio_len)
a19bfa
 	while ( encoded_len >= IMA_ADPCM_state.wavefmt.blockalign ) {
a19bfa
 		/* Grab the initial information for this block */
a19bfa
 		for ( c=0; c
a19bfa
+			if (encoded + 4 > encoded_end) goto invalid_size;
a19bfa
 			/* Fill the state information for this block */
a19bfa
 			state[c].sample = ((encoded[1]<<8)|encoded[0]);
a19bfa
 			encoded += 2;
a19bfa
@@ -384,6 +386,7 @@ static int IMA_ADPCM_decode(Uint8 **audio_buf, Uint32 *audio_len)
a19bfa
 		samplesleft = (IMA_ADPCM_state.wSamplesPerBlock-1)*channels;
a19bfa
 		while ( samplesleft > 0 ) {
a19bfa
 			for ( c=0; c
a19bfa
+				if (encoded + 4 > encoded_end) goto invalid_size;
a19bfa
 				Fill_IMA_ADPCM_block(decoded, encoded,
a19bfa
 						c, channels, &state[c]);
a19bfa
 				encoded += 4;
a19bfa
@@ -395,6 +398,10 @@ static int IMA_ADPCM_decode(Uint8 **audio_buf, Uint32 *audio_len)
a19bfa
 	}
a19bfa
 	SDL_free(freeable);
a19bfa
 	return(0);
a19bfa
+invalid_size:
a19bfa
+	SDL_SetError("Unexpected chunk length for an IMA ADPCM decoder");
a19bfa
+	SDL_free(freeable);
a19bfa
+	return(-1);
a19bfa
 }
a19bfa
 
a19bfa
 SDL_AudioSpec * SDL_LoadWAV_RW (SDL_RWops *src, int freesrc,
a19bfa
-- 
a19bfa
2.24.1
a19bfa