mirror of
https://gitlab.freedesktop.org/pipewire/pipewire.git
synced 2026-05-20 06:38:10 +02:00
Input Validation: High The netjack2_recv_data loop terminates based on the is_last flag from received network packets. A malicious peer could continuously send packets with is_last=0, causing the receive loop to run indefinitely and blocking the audio processing thread. This is a denial of service vulnerability. Add a maximum packet count (1024) per receive cycle. This is well above what any legitimate netjack2 session would produce but prevents a malicious peer from stalling the processing thread. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> |
||
|---|---|---|
| .. | ||
| packets.h | ||
| peer.c | ||