[libav-bugs] [Bug 1067] There is a heap based buffer overflow in the avconv && avprobe tools of the libav library. A crafted input can lead to a heap buffer overflow resulting in multiple damages.

bugzilla-daemon at libav.org bugzilla-daemon at libav.org
Fri Aug 18 17:50:19 CEST 2017


https://bugzilla.libav.org/show_bug.cgi?id=1067

--- Comment #2 from owl337 <v.owl337 at gmail.com> ---
<bugzilla at libav.org>于2017年8月18日 周五下午11:38写道:

> Agostino Sarubbo <ago at gentoo.org> changed bug 1067
> <https://bugzilla.libav.org/show_bug.cgi?id=1067>
> What Removed Added
> CC   ago at gentoo.org
>
> *Comment # 1 <https://bugzilla.libav.org/show_bug.cgi?id=1067#c1> on bug
> 1067 <https://bugzilla.libav.org/show_bug.cgi?id=1067> from Agostino
> Sarubbo <ago at gentoo.org> *
>
> https://blogs.gentoo.org/ago/2016/09/17/libav-null-pointer-dereference-in-put_no_rnd_pixels8_xy2_mmx-rnd_template-c/
> duplicate?
>
> ------------------------------
> You are receiving this mail because:
>
>    - You reported the bug.
>
> They are triggered on the same function, but bug
1067 of invalid memory access  is caused by a heap buffer overflow and the
bug path is different.

-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.libav.org/pipermail/libav-bugs/attachments/20170818/82137c0f/attachment.html>


More information about the libav-bugs mailing list