commit | a6f8cbfb6e8e1764b397dbcd08888c54b426bdf2 | [log] [tgz] |
---|---|---|
author | Tobias Ronge <tobiasr@axis.com> | Thu Mar 14 10:12:27 2019 +0100 |
committer | Jonas Larsson <ljonas@google.com> | Tue Nov 17 12:35:52 2020 -0800 |
tree | a94b65bb3ce6cb4f8c2552e9b41e8adf63617c1f | |
parent | 384ff7d0268c71e76f7328a9ca6dfe96e4a3ab23 [diff] |
gstrtspconnection: Security loophole making heap overflow The former code allowed an attacker to create a heap overflow by sending a longer than allowed session id in a response and including a semicolon to change the maximum length. With this change, the parser will never go beyond 512 bytes.