Merge pull request #2347 from kevinbackhouse/quicktimevideo-size-calc
Avoid potential integer overflow in QuickTimeVideo::userDataDecoder
This commit is contained in:
commit
248215976d
@ -803,7 +803,7 @@ void QuickTimeVideo::userDataDecoder(size_t size_external) {
|
||||
|
||||
tv = find(userDataReferencetags, Exiv2::toString(buf.data()));
|
||||
|
||||
if (size == 0 || (size - 12) <= 0)
|
||||
if (size <= 12)
|
||||
break;
|
||||
|
||||
else if (equalsQTimeTag(buf, "DcMD") || equalsQTimeTag(buf, "NCDT"))
|
||||
|
||||
Loading…
Reference in New Issue
Block a user