You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fix buffer overread vulnerabilities in RTP packet parsing
Add bounds checking to AmRtpPacket::parse() to prevent crashes and
potential security issues from malformed RTP packets:
- Add minimum packet size check (12 bytes) before accessing RTP header
- Validate CSRC list fits within packet before reading extension header
- Add overflow-safe extension header length validation
- Check data exists before reading padding length byte
These checks prevent out-of-bounds reads that could be triggered by
maliciously crafted RTP packets received from the network.
0 commit comments