On Tue, Aug 14, 2018 at 10:39 AM Jacob Trimble <modma...@google.com> wrote:
>
> If there is a saio/saiz in clear content, we shouldn't create the
> encryption index if we don't already have one.  Otherwise it will
> confuse the cenc_filter.
>
> Found by Chromium's ClusterFuzz: https://crbug.com/873432
>
> Signed-off-by: Jacob Trimble <modma...@google.com>
> ---
>  libavformat/mov.c | 28 ++++++++++++++++++----------
>  1 file changed, 18 insertions(+), 10 deletions(-)
>
> diff --git a/libavformat/mov.c b/libavformat/mov.c
> index c863047d79..50bc1cab4b 100644
> --- a/libavformat/mov.c
> +++ b/libavformat/mov.c
> @@ -5828,7 +5828,7 @@ static int mov_read_frma(MOVContext *c, AVIOContext 
> *pb, MOVAtom atom)
>   * info for this fragment; otherwise this will return the global encryption
>   * info for the current stream.
>   */
> -static int get_current_encryption_info(MOVContext *c, MOVEncryptionIndex 
> **encryption_index, MOVStreamContext **sc)
> +static int get_current_encryption_info(MOVContext *c, MOVEncryptionIndex 
> **encryption_index, MOVStreamContext **sc, int create)
>  {
>      MOVFragmentStreamInfo *frag_stream_info;
>      AVStream *st;
> @@ -5847,9 +5847,13 @@ static int get_current_encryption_info(MOVContext *c, 
> MOVEncryptionIndex **encry
>          *sc = st->priv_data;
>
>          if (!frag_stream_info->encryption_index) {
> -            frag_stream_info->encryption_index = 
> av_mallocz(sizeof(*frag_stream_info->encryption_index));
> -            if (!frag_stream_info->encryption_index)
> -                return AVERROR(ENOMEM);
> +            if (create) {
> +                frag_stream_info->encryption_index = 
> av_mallocz(sizeof(*frag_stream_info->encryption_index));
> +                if (!frag_stream_info->encryption_index)
> +                    return AVERROR(ENOMEM);
> +            } else {
> +                return 0;
> +            }
>          }
>          *encryption_index = frag_stream_info->encryption_index;
>          return 1;
> @@ -5862,9 +5866,13 @@ static int get_current_encryption_info(MOVContext *c, 
> MOVEncryptionIndex **encry
>          *sc = st->priv_data;
>
>          if (!(*sc)->cenc.encryption_index) {
> -            (*sc)->cenc.encryption_index = 
> av_mallocz(sizeof(*frag_stream_info->encryption_index));
> -            if (!(*sc)->cenc.encryption_index)
> -                return AVERROR(ENOMEM);
> +            if (create) {
> +                (*sc)->cenc.encryption_index = 
> av_mallocz(sizeof(*frag_stream_info->encryption_index));
> +                if (!(*sc)->cenc.encryption_index)
> +                    return AVERROR(ENOMEM);
> +            } else {
> +                return 0;
> +            }
>          }
>
>          *encryption_index = (*sc)->cenc.encryption_index;
> @@ -5931,7 +5939,7 @@ static int mov_read_senc(MOVContext *c, AVIOContext 
> *pb, MOVAtom atom)
>      int use_subsamples, ret;
>      unsigned int sample_count, i, alloc_size = 0;
>
> -    ret = get_current_encryption_info(c, &encryption_index, &sc);
> +    ret = get_current_encryption_info(c, &encryption_index, &sc, /* create 
> */ 1);
>      if (ret != 1)
>          return ret;
>
> @@ -6078,7 +6086,7 @@ static int mov_read_saiz(MOVContext *c, AVIOContext 
> *pb, MOVAtom atom)
>      int ret;
>      unsigned int sample_count, aux_info_type, aux_info_param;
>
> -    ret = get_current_encryption_info(c, &encryption_index, &sc);
> +    ret = get_current_encryption_info(c, &encryption_index, &sc, /* create 
> */ 0);
>      if (ret != 1)
>          return ret;
>
> @@ -6152,7 +6160,7 @@ static int mov_read_saio(MOVContext *c, AVIOContext 
> *pb, MOVAtom atom)
>      unsigned int version, entry_count, aux_info_type, aux_info_param;
>      unsigned int alloc_size = 0;
>
> -    ret = get_current_encryption_info(c, &encryption_index, &sc);
> +    ret = get_current_encryption_info(c, &encryption_index, &sc, /* create 
> */ 0);
>      if (ret != 1)
>          return ret;
>
> --
> 2.18.0.865.gffc8e1a3cd6-goog
>

After thinking of this more, this was the incorrect fix.  Attached is
the correct fix.
From 256880aca517f64257eb28342a656867d90307a7 Mon Sep 17 00:00:00 2001
From: Jacob Trimble <modma...@google.com>
Date: Tue, 14 Aug 2018 10:18:55 -0700
Subject: [PATCH] avformat/mov: Allow saio/saiz in clear content.

If there is a saio/saiz in clear content, we shouldn't create the
encryption index if we don't already have one.  Otherwise it will
confuse the cenc_filter.

Found by Chromium's ClusterFuzz: https://crbug.com/873432

Signed-off-by: Jacob Trimble <modma...@google.com>
---
 libavformat/mov.c | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/libavformat/mov.c b/libavformat/mov.c
index c863047d79..ee9acdb73c 100644
--- a/libavformat/mov.c
+++ b/libavformat/mov.c
@@ -5847,6 +5847,9 @@ static int get_current_encryption_info(MOVContext *c, MOVEncryptionIndex **encry
         *sc = st->priv_data;
 
         if (!frag_stream_info->encryption_index) {
+            // If this stream isn't encrypted, don't create the index.
+            if (!(*sc)->cenc.default_encrypted_sample)
+                return 0;
             frag_stream_info->encryption_index = av_mallocz(sizeof(*frag_stream_info->encryption_index));
             if (!frag_stream_info->encryption_index)
                 return AVERROR(ENOMEM);
@@ -5862,6 +5865,9 @@ static int get_current_encryption_info(MOVContext *c, MOVEncryptionIndex **encry
         *sc = st->priv_data;
 
         if (!(*sc)->cenc.encryption_index) {
+            // If this stream isn't encrypted, don't create the index.
+            if (!(*sc)->cenc.default_encrypted_sample)
+                return 0;
             (*sc)->cenc.encryption_index = av_mallocz(sizeof(*frag_stream_info->encryption_index));
             if (!(*sc)->cenc.encryption_index)
                 return AVERROR(ENOMEM);
-- 
2.18.0.865.gffc8e1a3cd6-goog

_______________________________________________
ffmpeg-devel mailing list
ffmpeg-devel@ffmpeg.org
http://ffmpeg.org/mailman/listinfo/ffmpeg-devel

Reply via email to