summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorEdwin Wong <edwinwong@google.com>2021-04-05 21:22:06 +0000
committerAndroid (Google) Code Review <android-gerrit@google.com>2021-04-05 21:22:06 +0000
commit5b3fc84035a7e521135e85fd1764452a0eae1e8e (patch)
tree5751496f5a326dc9be04a5d89a079d95f5b9400d
parent78cc1229099782c4f70a0bf3b1de61aa8c368398 (diff)
parent49c0fe413ceb2e0cef356d2738d63bb873845e04 (diff)
Merge "Fix potential decrypt destPtr overflow." into rvc-dev
-rw-r--r--drm/mediadrm/plugins/clearkey/hidl/CryptoPlugin.cpp8
1 files changed, 5 insertions, 3 deletions
diff --git a/drm/mediadrm/plugins/clearkey/hidl/CryptoPlugin.cpp b/drm/mediadrm/plugins/clearkey/hidl/CryptoPlugin.cpp
index d278633482..005e551383 100644
--- a/drm/mediadrm/plugins/clearkey/hidl/CryptoPlugin.cpp
+++ b/drm/mediadrm/plugins/clearkey/hidl/CryptoPlugin.cpp
@@ -142,12 +142,14 @@ Return<void> CryptoPlugin::decrypt_1_2(
base = static_cast<uint8_t *>(static_cast<void *>(destBase->getPointer()));
- if (destBuffer.offset + destBuffer.size > destBase->getSize()) {
+ totalSize = 0;
+ if (__builtin_add_overflow(destBuffer.offset, destBuffer.size, &totalSize) ||
+ totalSize > destBase->getSize()) {
+ android_errorWriteLog(0x534e4554, "176444622");
_hidl_cb(Status_V1_2::ERROR_DRM_FRAME_TOO_LARGE, 0, "invalid buffer size");
return Void();
}
- destPtr = static_cast<void *>(base + destination.nonsecureMemory.offset);
-
+ destPtr = static_cast<void*>(base + destination.nonsecureMemory.offset);
// Calculate the output buffer size and determine if any subsamples are
// encrypted.