>From 8286eb98a6f40fc1e69507213073486ef06d3a5d Mon Sep 17 00:00:00 2001
From: OxBat <[email protected]>
Date: Sat, 3 Jan 2026 17:10:07 +0100
Subject: [PATCH] tools/zmqsend: fix integer overflow on 32-bit systems in
 tools/zmqsend.c

---
 tools/zmqsend.c | 13 +++++++++++--
 1 file changed, 11 insertions(+), 2 deletions(-)

diff --git a/tools/zmqsend.c b/tools/zmqsend.c
index dc5d426cc8..b2d66bb8bc 100644
--- a/tools/zmqsend.c
+++ b/tools/zmqsend.c
@@ -149,8 +149,16 @@ int main(int argc, char **argv)
         goto end;
     }

-    recv_buf_size = zmq_msg_size(&msg) + 1;
+/* PATCH SECURITY: Fix integer overflow on 32-bit systems */
+    size_t sz = zmq_msg_size(&msg);
+    if (sz == SIZE_MAX) {
+        av_log(NULL, AV_LOG_ERROR, "Message too large (overflow
detected)\n");
+        ret = 1;
+        goto end;
+    }
+    recv_buf_size = sz + 1;
     recv_buf = av_malloc(recv_buf_size);
+
     if (!recv_buf) {
         av_log(NULL, AV_LOG_ERROR,
                "Could not allocate receiving message buffer\n");
@@ -158,6 +166,7 @@ int main(int argc, char **argv)
         ret = 1;
         goto end;
     }
+
     memcpy(recv_buf, zmq_msg_data(&msg), recv_buf_size - 1);
     recv_buf[recv_buf_size-1] = 0;
     printf("%s\n", recv_buf);
@@ -168,4 +177,4 @@ end:
     zmq_close(socket);
     zmq_ctx_destroy(zmq_ctx);
     return ret;
-}
+}
\ No newline at end of file
-- 
2.52.0.windows.1

Attachment: 0001-tools-zmqsend-fix-integer-overflow-on-32-bit-systems.patch
Description: Binary data

_______________________________________________
ffmpeg-devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to