On 2012/08/16 18:18, Jurgen Kramer <gtmkra...@xs4all.nl> wrote:
> Lots of activity in git. Just a reminder for above commit.

Memory leak in dsdlib_tag_id3().

Can you use dsdlib_tag_id3() for a DoS attack?  This looks like it
could easily cause a stack overflow:

+   count = is->size - is->offset;
+   id3_byte_t dsdid3[count];

This looks suspicious, too:

+       uint64_t length = (uint64_t)GUINT32_FROM_BE(metatag.size);
+       char string[length];

Why is this 32 bit integer casted to 64 bit and then back to 32 bit,
anyway?

Remember: bad files must *never* cause MPD to crash!  If my theory is
true, this is a serious security vulnerability you're about to add to
MPD.

scan_id3_tag() has duplicate documentation.  API documentation belongs
to the header file.

Remove the version number from the commit message.  I will not merge
the old versions of your patch, these should be deleted.  Rebase on my
master branch, and submit *only* the patches you want me to merge, not
all the old versions.

Some API documentation for variables like diar_offset, diti_size could
be useful.  I don't understand what they mean.

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Musicpd-dev-team mailing list
Musicpd-dev-team@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/musicpd-dev-team

Reply via email to