Headline
CVE-2023-3012: fixed #2480 · gpac/gpac@53387aa
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.
Expand Up
@@ -704,6 +704,8 @@ static void xml_sax_parse_entity(GF_SAXParser *parser)
}
}
if (ent_name) gf_free(ent_name);
if (ent && !ent->value)
parser->sax_state = SAX_STATE_SYNTAX_ERROR;
xml_sax_store_text(parser, i);
}
Expand Down Expand Up
@@ -968,7 +970,7 @@ static GF_Err xml_sax_parse(GF_SAXParser *parser, Bool force_parse)
static GF_Err xml_sax_append_string(GF_SAXParser *parser, char *string)
{
u32 size = parser->line_size;
u32 nl_size = (u32) strlen(string);
u32 nl_size = string ? (u32) strlen(string) : 0;
if (!nl_size) return GF_OK;
Expand Down
Related news
Debian Linux Security Advisory 5452-1 - Multiple security issues were discovered in the GPAC multimedia framework which could result in denial of service or the execution of arbitrary code.