rtcpbuffer: prevent overflow of 16bit header length.

RTCP header can be  (2^16 + 1) * 4 bytes long, so when validating a bogus
packet it was possible to get a 16bit overflow resulting in a length of 0.
This would put the gst_rtcp_buffer_validate_data function in a endless loop.

https://bugzilla.gnome.org/show_bug.cgi?id=667313
This commit is contained in:
Pascal Buhler 2011-10-12 11:28:10 +02:00 committed by Tim-Philipp Müller
parent cfdb48ba8f
commit 0febae7443

View file

@ -111,7 +111,7 @@ gboolean
gst_rtcp_buffer_validate_data (guint8 * data, guint len)
{
guint16 header_mask;
guint16 header_len;
guint header_len;
guint8 version;
guint data_len;
gboolean padding;