Merge pull request #2347 from kevinbackhouse/quicktimevideo-size-calc

Avoid potential integer overflow in QuickTimeVideo::userDataDecoder
This commit is contained in:
Kevin Backhouse 2022-09-07 08:07:25 +01:00 committed by GitHub
commit 248215976d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -803,7 +803,7 @@ void QuickTimeVideo::userDataDecoder(size_t size_external) {
tv = find(userDataReferencetags, Exiv2::toString(buf.data()));
if (size == 0 || (size - 12) <= 0)
if (size <= 12)
break;
else if (equalsQTimeTag(buf, "DcMD") || equalsQTimeTag(buf, "NCDT"))