ape: added protection against large memory allocations
The function tag_ape_load() retrieves a 32 bit unsigned integer from the input file, and passes it to g_malloc(). This is dangerous, and may be used for a denial of service attack on MPD.
This commit is contained in:
@@ -89,6 +89,9 @@ tag_ape_load(const char *file)
|
||||
tagLen = GUINT32_FROM_LE(footer.length);
|
||||
if (tagLen <= sizeof(footer) + 10)
|
||||
goto fail;
|
||||
if (tagLen > 1024 * 1024)
|
||||
/* refuse to load more than one megabyte of tag data */
|
||||
goto fail;
|
||||
if (fseek(fp, size - tagLen, SEEK_SET))
|
||||
goto fail;
|
||||
|
||||
|
Reference in New Issue
Block a user