• Tobias Ronge's avatar
    gstrtspconnection: Security loophole making heap overflow · 9ff50195
    Tobias Ronge authored
    The former code allowed an attacker to create a heap overflow by
    sending a longer than allowed session id in a response and including a
    semicolon to change the maximum length. With this change, the parser
    will never go beyond 512 bytes.
gstrtspconnection.c 111 KB