aboutsummaryrefslogtreecommitdiffhomepage
path: root/src
diff options
context:
space:
mode:
authorGravatar sugoi <sugoi@chromium.org>2015-01-07 08:47:44 -0800
committerGravatar Commit bot <commit-bot@chromium.org>2015-01-07 08:47:44 -0800
commitbd0d9da981289504c9dcd8547eaad52b1f4a52cb (patch)
treee33a8a6e2062247821fe895ead3f03a93f9b9eb7 /src
parent36a364a846dd5cee382069430f376286fe6c3af5 (diff)
Verify size_t overflow
In 32 bits, it's possible that multiplying 2 32b values might overflow a size_t, which could be 32b unsigned in that context, so I added a check for size_t overflow. BUG=445831 Review URL: https://codereview.chromium.org/836733005
Diffstat (limited to 'src')
-rw-r--r--src/core/SkBitmap.cpp13
1 files changed, 7 insertions, 6 deletions
diff --git a/src/core/SkBitmap.cpp b/src/core/SkBitmap.cpp
index 9db596de9c..c962aea21a 100644
--- a/src/core/SkBitmap.cpp
+++ b/src/core/SkBitmap.cpp
@@ -1202,16 +1202,17 @@ bool SkBitmap::ReadRawPixels(SkReadBuffer* buffer, SkBitmap* bitmap) {
}
const size_t ramRB = info.minRowBytes();
- const int height = info.height();
- const size_t snugSize = snugRB * height;
- const size_t ramSize = ramRB * height;
- if (!buffer->validate(snugSize <= ramSize)) {
+ const int height = SkMax32(info.height(), 0);
+ const uint64_t snugSize = sk_64_mul(snugRB, height);
+ const uint64_t ramSize = sk_64_mul(ramRB, height);
+ static const uint64_t max_size_t = (size_t)(-1);
+ if (!buffer->validate((snugSize <= ramSize) && (ramSize <= max_size_t))) {
return false;
}
- SkAutoDataUnref data(SkData::NewUninitialized(ramSize));
+ SkAutoDataUnref data(SkData::NewUninitialized(SkToSizeT(ramSize)));
char* dst = (char*)data->writable_data();
- buffer->readByteArray(dst, snugSize);
+ buffer->readByteArray(dst, SkToSizeT(snugSize));
if (snugSize != ramSize) {
const char* srcRow = dst + snugRB * (height - 1);