mirror of
https://github.com/CCExtractor/ccextractor.git
synced 2026-04-21 21:49:57 +00:00
[PR #1951] [CLOSED] Fix/isdbcc stack overflow #2753
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/CCExtractor/ccextractor/pull/1951
Author: @THE-Amrit-mahto-05
Created: 1/1/2026
Status: ❌ Closed
Base:
master← Head:fix/isdbcc-stack-overflow📝 Commits (2)
7526da8Prevent integer overflow in EIA-608 screen buffer reallocation64484af[FIX] Prevent stack buffer overflow in ISDB-CC decoder parse_csi📊 Changes
2 files changed (+28 additions, -7 deletions)
View changed files
📝
src/lib_ccx/ccx_decoders_608.c(+24 -4)📝
src/lib_ccx/ccx_decoders_isdb.c(+4 -3)📄 Description
[FIX] Prevent stack buffer overflow in ISDB-CC decoder parse_csi
In raising this pull request, I confirm the following (please check boxes):
My familiarity with the project is as follows (check one):
Description
This pull request fixes a stack buffer overflow in the ISDB-CC decoder.
Component: ISDB-CC decoder
File: src/lib_ccx/ccx_decoders_isdb.c
Function: parse_csi
Problem
The function
parse_csiuses a small stack bufferuint8_t arg[10]to store CSI command arguments.The original code had a dangerous off-by-one error:
This allowed writing 11 bytes into a 10-byte buffer, causing a stack buffer overflow.
A malformed subtitle could crash the program or corrupt memory.
Solution
Impact
Fixes issue: #1950
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.