GNOME Bugzilla – Bug 667313
rtcpbuffer: prevent overflow of 16bit header length.
Last modified: 2012-02-02 20:53:57 UTC
Created attachment 204631 [details] [review] patch RTCP header can be (2^16 + 1) * 4 bytes long, so when validating a bogus packet it was possible to get a 16bit overflow resulting in a length of 0. This would put the gst_rtcp_buffer_validate_data function in a endless loop.
This patch didn't apply because your _validate() function has an extra guint32 flags argument. If this is a generally useful change, we could do this in 0.11, for what it's worth.. commit 0febae7443b165ceaa69641e95d7069f26719e59 Author: Pascal Buhler <pabuhler@cisco.com> Date: Wed Oct 12 11:28:10 2011 +0200 rtcpbuffer: prevent overflow of 16bit header length. RTCP header can be (2^16 + 1) * 4 bytes long, so when validating a bogus packet it was possible to get a 16bit overflow resulting in a length of 0. This would put the gst_rtcp_buffer_validate_data function in a endless loop. https://bugzilla.gnome.org/show_bug.cgi?id=667313
The patch was pushed, should this be closed, or are you waiting on another patch for the flags argument ?
Let's close this. The flag stuff is probably for something different, so likely belongs in a new bug.