-
Notifications
You must be signed in to change notification settings - Fork 85
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
A potential bug of NPD #36
Comments
ePirat
pushed a commit
that referenced
this issue
Sep 7, 2022
Instead of segfault, report OP_EFAULT if ogg_sync_buffer returns a null pointer. This allows more graceful recovery by the caller in the unlikely event of a fallable ogg_malloc call. We do check the return value elsewhere in the code, so the new checks make the code more consistent. Thanks to #36 for reporting.
A lot of our code assumes |
ok.thank you for your effort. |
rillian
added a commit
that referenced
this issue
Sep 7, 2022
Instead of segfault, report OP_EFAULT if ogg_sync_buffer returns a null pointer. This allows more graceful recovery by the caller in the unlikely event of a fallible ogg_malloc call. We do check the return value elsewhere in the code, so the new checks make the code more consistent. Thanks to #36 for reporting. Signed-off-by: Timothy B. Terriberry <[email protected]> Signed-off-by: Mark Harris <[email protected]>
Fixed in 0a4cd79. Thanks for the report! |
LeSuisse
added a commit
to LeSuisse/nixpkgs
that referenced
this issue
Jan 27, 2023
Upstream issue: xiph/opusfile#36
13 tasks
github-actions bot
pushed a commit
to NixOS/nixpkgs
that referenced
this issue
Jan 28, 2023
Upstream issue: xiph/opusfile#36 (cherry picked from commit 6515a7a)
sezero
pushed a commit
to libsdl-org/opusfile
that referenced
this issue
Mar 2, 2023
Instead of segfault, report OP_EFAULT if ogg_sync_buffer returns a null pointer. This allows more graceful recovery by the caller in the unlikely event of a fallible ogg_malloc call. We do check the return value elsewhere in the code, so the new checks make the code more consistent. Thanks to xiph#36 for reporting. Signed-off-by: Timothy B. Terriberry <[email protected]> Signed-off-by: Mark Harris <[email protected]> (cherry picked from commit 0a4cd79)
kraj
pushed a commit
to YoeDistro/meta-openembedded
that referenced
this issue
Dec 24, 2024
This patch is mentioned in [1] and [2]. [1] https://nvd.nist.gov/vuln/detail/CVE-2022-47021 [2] xiph/opusfile#36 Signed-off-by: Peter Marko <[email protected]> Signed-off-by: Khem Raj <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hi, I found a potential null pointer dereference bug in the project source code of opusfile, and I have shown the execution sequence of the program that may generate the bug on the graph below. The red text illustrates the steps that generate the bug, the red arrows represent the control flow,the file path can be seen in the blue framed section.
Although the code shown is for version 0.9 but is still exist in current version
opusfile/src/opusfile.c
Lines 1527 to 1532 in cf218fb
would you can help to check if this bug is true?thank you for your effort and patience!
The text was updated successfully, but these errors were encountered: