[FFmpeg-devel] ADPCM task (was Re: files in incoming)
Fri Jan 30 21:34:27 CET 2009
Reimar D?ffinger wrote:
> On Fri, Jan 30, 2009 at 06:55:04PM +0100, Stefan Gehrer wrote:
>> Reimar D?ffinger wrote:
>>> On Fri, Jan 30, 2009 at 08:06:04AM +0100, Stefan Gehrer wrote:
>>>> @@ -1303,6 +1304,7 @@
>>>> srcC = src + (avctx->channels-channel) * 4;
>>>> srcC += (big_endian ? bytestream_get_be32(&src)
>>>> : bytestream_get_le32(&src));
>>>> + if ((srcC > src_end - 4) || (srcC < src)) break;
>>> Unfortunately no, a C compiler is allowed to assume that pointer
>>> operations will never overflow, thus removing the (srcC < src) check.
>> Interesting. Do you have a source where I can read that up?
>> And if the answer is ANSI C / ISO 9899, maybe a more specific hint?
> Well, the way I put it is the reality as gcc handles it, the standard is
> far more restrictive, quoting the C99 standardi, section 220.127.116.11:
>> If both the pointer
>> operand and the result point to elements of the same array object, or
>> one past the last
>> element of the array object, the evaluation shall not produce an
>> overflow; otherwise, the
>> behavior is undefined.
> Emphasis on "undefined", which is about the worst case you can
> So even as soon as you just add a value that is larger than
> the array size to a pointer anything may happen just going by this...
> In case of gcc, "only" an important half of your security check goes
Hmm, I am not entirely convinced. For me that rather reads
"if you do your pointer arithmetics nicely within an array, their
will be no overflow. If you do it beyond an array, there may
or may not be an overflow."
That means after our calculation of srcC there might have
been an overflow, as it is not pointing to an element of an array
object, therefore a check on srcC being smaller than src is a valid
check that can not be omitted.
But of course I am happy to be corrected ...
More information about the ffmpeg-devel