mirror of
https://gitlab.freedesktop.org/pipewire/pipewire.git
synced 2026-04-29 06:46:38 -04:00
Input Validation / Memory Safety: Medium The RTSP client used for RAOP/AirPlay communication accepted arbitrarily large Content-Length values from the remote server without any upper bound. A malicious or compromised AirPlay server could specify a very large Content-Length, causing the client to allocate unbounded memory and potentially exhaust system resources (denial of service). Additionally, the return value of pw_array_add() was not checked. If the allocation failed, the subsequent memcpy would dereference a NULL pointer, causing a crash. Add a 64KB limit on Content-Length (more than sufficient for RTSP control messages) and check the pw_array_add return value. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> |
||
|---|---|---|
| .. | ||
| daemon | ||
| examples | ||
| gst | ||
| modules | ||
| pipewire | ||
| tests | ||
| tools | ||
| meson.build | ||