Use the sps from the image #366
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
(as e.g mc_chroma is using the sps to determine
picture properties, like pic_width_in_luma_samples and pic_height_in_luma_samples, I think this is
more correct.
This PR is for discussion. (See #345.)
It makes the failures go away, but that does not mean it's correct :)
The following poc will be stop failing if (only) this patch is applied:
The following are still failing if only this patch is applied, but they stop failing if #365 is applied as well, but will still fail with ONLY #365 applied (IOW, both are needed)
poc1 Heap-buffer-overflow in sse-motion.cc: ff_hevc_put_hevc_qpel_h_2_v_1_sse #335 - CVE-2022-43240
poc3 Heap-buffer-overflow in sse-motion.cc: ff_hevc_put_hevc_epel_pixels_8_sse #337 - CVE-2022-43235
poc5 Heap-buffer-overflow in sse-motion.cc: ff_hevc_put_weighted_pred_avg_8_sse #339 - CVE-2022-43243
poc9-1,poc9-2, poc9-4 Stack-buffer-overflow in fallback-motion.cc: void put_qpel_fallback<unsigned short> #343 - CVE-2022-43236
poc14 Heap-buffer-overflow in fallback-motion.cc: put_unweighted_pred_16_fallback #348 - CVE-2022-43253
poc15 Heap-buffer-overflow in fallback-motion.cc: put_weighted_pred_avg_16_fallback #349 - CVE-2022-43248
poc17-1, poc17-2 Heap-buffer-overflow in sao.cc: void apply_sao_internal<unsigned short> #351poc18 SEGV sao.cc: in void apply_sao_internal<unsigned short> #352 - CVE-2022-43245Edit: poc17-x and poc-18 is NOT fixed with that. Sorry for the confusion.