-
-
Notifications
You must be signed in to change notification settings - Fork 457
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SEGV:occured in function decoder_context::process_slice_segment_header at decctx.cc:2007:20 #393
Comments
blu3sh0rk
changed the title
SEGV:NULL Pointer Dereference in function decoder_context::process_slice_segment_header at decctx.cc:2007:20
SEGV:occur in function decoder_context::process_slice_segment_header at decctx.cc:2007:20
Feb 20, 2023
blu3sh0rk
changed the title
SEGV:occur in function decoder_context::process_slice_segment_header at decctx.cc:2007:20
SEGV:occured in function decoder_context::process_slice_segment_header at decctx.cc:2007:20
Feb 20, 2023
Thank you |
Is it possible to do a patch release in the upcoming weeks that officially addresses this issue (https://nvd.nist.gov/vuln/detail/CVE-2023-27102) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Desctiption
A SEGV has occurred when running program dec265
NULL Pointer Dereference in function decoder_context::process_slice_segment_header at decctx.cc:2007:20
Version
Steps to reproduce
POC
https:/blu3sh0rk/Fuzzing-crash/blob/main/SEGV.zip
GDB INFO
Impact
Due to incorrect access control, a SEGV caused by a READ memory access occurred at line 2007 of the code. This issue can cause a Denial of Service attack.
The text was updated successfully, but these errors were encountered: