issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 261k ⌀ | issue_title stringlengths 1 925 | issue_comments_url stringlengths 56 81 | issue_comments_count int64 0 2.5k | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 37 62 | issue_github_id int64 387k 2.46B | issue_number int64 1 127k |
|---|---|---|---|---|---|---|---|---|---|
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
Hello:
I have one video file: 1.mp4, it contains only one video track and only one audio track. I want to extract the only audio from it, but I don't know the audio track ID, sometimes, it is 2, but most of the times (90%+), the audio track ID will be a high number, like 256, 257 or 1001, there is no way to know the track ID without using mp4box -info.
However, I know that the MP4 file has only one audio track.
Can I run mp4box to extract the audio track without knowing its audio track ID?
ffmpeg can do this, but I prefer to use mp4box.
Please advise! | How to extract audio from video file without knowing the audio track ID? | https://api.github.com/repos/gpac/gpac/issues/2187/comments | 2 | 2022-05-06T12:06:46Z | 2022-05-06T16:26:55Z | https://github.com/gpac/gpac/issues/2187 | 1,227,780,953 | 2,187 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
Hello:
I have one video (MP4 format) file: 0.mp4.
I want to split it by 3 time ranges: from 00:00:10 to 00:00:20; from 00:00:45 to 00:01:00; from 00:02:00 to 00:03:00. And then merge/concat them into one video file: merge.mp4.
I know I can use splitx to split 0.mp4 into 3 files, like: 1.mp4, 2.mp4, 3.mp4, then run -force-cat command to merge/concat them into one file: merge.mp4
But I want to know if I can use one command to skip the middle steps and generate the result directly.
FFMPEG has similar command like: between(t, t0, t1) + between(t, t2, t3) ...
But I want to know if I can do the same with MP4box.
Thanks,
| Can I use MP4Box to split one video into multiple parts and merge them into one video? | https://api.github.com/repos/gpac/gpac/issues/2186/comments | 6 | 2022-05-04T18:23:16Z | 2022-05-18T09:09:27Z | https://github.com/gpac/gpac/issues/2186 | 1,225,724,202 | 2,186 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
Let's say I have 3 video (mp4 format) files: 1.mp4, 2.mp4, 3.mp4
I can use the following command to concat them:
mp4box -force-cat -cat 1.mp4 -cat 2.mp4 -cat 3.mp4 merge.mp4
This works well. However, when I want to extract audio from the merge.mp4 file, I have to manually use mp4box -info merge.mp4 to find what is the track ID# for audio, some times, this value is rather high, like 256 or 257.
I want to know if it is possible to set video/audio track ID when I concat multiple videos, all the videos have the same resolution and frame rate.
But I want to forecily set the audio track ID# to 2, and set video track ID# to 1.
Is it possible, if yes, please provide some command samples.
Thanks, | Can I use mp4box to set audio ID# when concat multiple video files? | https://api.github.com/repos/gpac/gpac/issues/2185/comments | 1 | 2022-05-04T11:07:15Z | 2022-05-17T10:00:09Z | https://github.com/gpac/gpac/issues/2185 | 1,225,223,268 | 2,185 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
Hello:
I have one audio file (aac format) named: 1.aac, and one video file (mp4 format) named: 1.mp4, the video file has no audio, and its duration is 5 seconds longer than the audio file.
Let’s say that: 1.aac file has duration of 55 seconds, and 1.mp4 file has duration of 1 minute.
I want to make one video file: merge.mp4 with audio from 1.aac, and video from 1.mp4.
But with one requirement that the audio start from the 5th second, therefore, the audio and video will end at the same time at the end of merge.mp4.
I can’t find any example on how to do this using MP4Box, however, FFMPEG has such parameter, but I prefer to use MP4Box, as it is faster and better.
I am using MP4Box version 2.0 on Windows 10.
Please advise,
Thanks,
| Can I use MP4Box to combine audio and video with some delay into one video file? | https://api.github.com/repos/gpac/gpac/issues/2184/comments | 4 | 2022-05-03T20:00:56Z | 2022-05-06T15:51:23Z | https://github.com/gpac/gpac/issues/2184 | 1,224,564,603 | 2,184 |
[
"gpac",
"gpac"
] | Hello!
I've noticed that MP4Box is changing the values of my HDR10 mastering display characteristics (i.e. the SMTPTE ST.2086 metadata that x265 injects into the HEVC bitstream).
When I use mediainfo to inspect the original MP4 out of ffmpeg I see what I specified:
```
Mastering display color primaries : BT.2020
MasteringDisplay_ColorPrimaries_Source : Stream
Mastering display luminance : min: 0.0050 cd/m2, max: 1000 cd/m2
MasteringDisplay_Luminance_Source : Stream
```
However, when I look at the remuxed MP4 that comes out of MP4Box now things are really weird:
```
Mastering display luminance : min: 0.0768 cd/m2, max: 1000 cd/m2
MasteringDisplay_Luminance_Source : Container
MasteringDisplay_Luminance_Original : min: 0.0050 cd/m2, max: 1000 cd/m2
MasteringDisplay_Luminance_Original_Sour : Stream
Maximum Frame-Average Light Level : 768 cd/m2
MaxFALL_Source : Container
```
Also, MP4Box seemingly made up a MaxFALL value as well!
Where did these values come from? I've used Vega stream analyzer and I see the SEI messages on the IDRs for both the content light level (0 for maxcll and maxfall) and mastering display (0.005 - 1000 nit BT. 2020 D65) signaled with no inconsistency.
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Sample file:
https://www.mediafire.com/file/ncx3yd1qjb0ojnk/fake_hdr10.mp4/file
How to repro:
```
PS D:\TestClips\tears of steel> MP4Box -raw 1 fake_hdr10.mp4
Exporting HEVC Video - Size 1920x800
PS D:\TestClips\tears of steel> MP4Box -add fake_hdr10_track1.hvc:fps=24000/1001 remux_03.mp4
Track Importing HEVC - Width 1920 Height 800 FPS 24000/1001 SAR 1/1
HEVC Import results: 120 samples (253 NALUs) - Slices: 2 I 30 P 88 B - 6 SEI - 2 IDR - 0 CRA
HEVC Stream uses forward prediction - stream CTS offset: 3 frames
HEVC Max NALU size is 15170 - stream could be optimized by setting nal_length=2
0.500 secs Interleaving
```
I did notice that just remuxing directly instead of demuxing and then muxing that works around this for some reason. For example:
```
MP4Box -add fake_hdr10.mp4 new.mp4
```
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
| MP4Box changing HDR10 SMPTE ST.2086 (mastering display characteristics) metadata? | https://api.github.com/repos/gpac/gpac/issues/2183/comments | 1 | 2022-05-03T19:15:07Z | 2022-05-17T12:43:46Z | https://github.com/gpac/gpac/issues/2183 | 1,224,510,290 | 2,183 |
[
"gpac",
"gpac"
] | poc.py is available [here](https://drive.google.com/file/d/1M-H0WLIomHlEfyr2rJlfZsV2INDlKgqO/view?usp=sharing)
```
Description
A malicious RTSP server can trigger a stack buffer overflow via an RTSP packet with an excessively long content-length due to no bounds check when copying into a fixed sized buffer.
Proof of Concept
(terminal 1)
python3 poc.py 31337
(terminal 2)
./configure --enable-sanitizer
make -j32
./bin/gcc/gpac -play rtsp://127.0.0.1:31337/test
ietf/rtsp_common.c:86:7: runtime error: index 30 out of bounds for type 'char [30]'
GDB
Thread 1 "gpac" received signal SIGABRT, Aborted.
0x00007ffff749d34c in __pthread_kill_implementation () from /usr/lib/libc.so.6
(gdb) bt
#0 0x00007ffff749d34c in __pthread_kill_implementation () at /usr/lib/libc.so.6
#1 0x00007ffff74504b8 in raise () at /usr/lib/libc.so.6
#2 0x00007ffff743a534 in abort () at /usr/lib/libc.so.6
#3 0x00007ffff7491397 in __libc_message () at /usr/lib/libc.so.6
#4 0x00007ffff75302fa in __fortify_fail () at /usr/lib/libc.so.6
#5 0x00007ffff75302c6 in () at /usr/lib/libc.so.6
#6 0x00007ffff780e9c9 in () at /gpac/bin/gcc/libgpac.so.11
#7 0x00007ffff780eaf8 in gf_rtsp_read_reply () at /gpac/bin/gcc/libgpac.so.11
#8 0x00007ffff7810cb5 in gf_rtsp_get_response () at /gpac/bin/gcc/libgpac.so.11
#9 0x00007ffff7bda785 in rtpin_rtsp_process_commands () at /gpac/bin/gcc/libgpac.so.11
#10 0x00007ffff7bd9bb6 in rtpin_process () at /gpac/bin/gcc/libgpac.so.11
#11 0x00007ffff7b3abb5 in gf_filter_process_task () at /gpac/bin/gcc/libgpac.so.11
#12 0x00007ffff7b281f7 in gf_fs_thread_proc () at /gpac/bin/gcc/libgpac.so.11
#13 0x00007ffff7b2d1ab in gf_fs_run () at /gpac/bin/gcc/libgpac.so.11
#14 0x0000555555563a7f in gpac_main ()
#15 0x00007ffff743b310 in __libc_start_call_main () at /usr/lib/libc.so.6
#16 0x00007ffff743b3c1 in __libc_start_main_impl () at /usr/lib/libc.so.6
#17 0x0000555555559dc5 in _start ()
Impact
This is capable of causing crashes and allowing modification of stack memory which could lead to remote code execution.
Occurrences
rtsp_common.c L86
``` | Stack buffer overflow in RTSP packet parsing | https://api.github.com/repos/gpac/gpac/issues/2182/comments | 0 | 2022-05-02T16:48:54Z | 2022-05-16T10:30:00Z | https://github.com/gpac/gpac/issues/2182 | 1,223,107,663 | 2,182 |
[
"gpac",
"gpac"
] | Command used:
`MP4Box -add BL_RPU.hevc:dv-profile=5 -add "1.eng.eac3":timescale=1000:delay=3003:sopt:gfreg=ffdmx -lang 2=eng -brand mp42isom -ab dby1 output.mp4`
I checked the output using ffprobe to check the resulting file with this command:
`ffprobe -loglevel error -show_entries stream=start_time:stream=time_base:stream=start_pts output.mp4`
Unfortunatly in the resulting file only the timescale option is used and the delay option not used at all.
ffprobe output I get is:
```
time_base=1/1000
start_pts=0
start_time=0.000000
```
But I would expect:
```
time_base=1/1000
start_pts=3003
start_time=3.003000
```
```
$ MP4Box -version
MP4Box - GPAC version 2.1-DEV-rev123-gbd1492420-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
MINI build (encoders, decoders, audio and video output disabled)
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --static-bin
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_DISABLE_3D
``` | delay not used when using timescale | https://api.github.com/repos/gpac/gpac/issues/2181/comments | 1 | 2022-04-28T21:34:55Z | 2022-05-17T10:13:25Z | https://github.com/gpac/gpac/issues/2181 | 1,219,324,781 | 2,181 |
[
"gpac",
"gpac"
] | Hello there, I'm using a GPAC version compiled with ffmpeg and libkvazaar to try and generate the MPD and segmets from a live feed.
when i hit this
gpac -i ./1.mp4 ffsws:FID=S -+kvazaar-params=tiles=3x3,slices=tiles,mv-constraint=frametilemargin,rc-algorithm=lambda enc:SID=S:c=libkvazaar:b=1m:fintra=1:rc @ tilesplit:FID=1 enc:SID=S:c=libkvazaar:b=200k:fintra=1:rc @ tilesplit:FID=2 -o ./dash/live.mpd:SID=1,2:dmode=dynamic
I have this problem is the encoding not fast enough?
Still can adjust those parameters to improve this problem
Disabling TMVP because tiles are used.
Disabling WPP because tiles were enabled.
Compiled: INTEL, flags: MMX SSE SSE2
Detected: INTEL, flags: MMX SSE SSE2 SSE3 SSSE3 SSE41 SSE42 AVX AVX2
Available: avx(1749) avx2(8586) sse2(318) sse41(636)
In use: avx(159) avx2(8586)
--owf=auto value set to 2.
--threads=auto value set to 2.
Disabling TMVP because tiles are used.
Disabling WPP because tiles were enabled.
Compiled: INTEL, flags: MMX SSE SSE2
Detected: INTEL, flags: MMX SSE SSE2 SSE3 SSSE3 SSE41 SSE42 AVX AVX2
Available: avx(1760) avx2(8640) sse2(320) sse41(640)
In use: avx(160) avx2(8640)
--owf=auto value set to 2.
--threads=auto value set to 2.
[Dasher] AS-1 Rep 1 segment 79 done TOO LATE by 77651 ms
[Dasher] AS-1 Rep 3 segment 79 done TOO LATE by 77777 ms
[Dasher] AS-1 Rep 12 segment 79 done TOO LATE by 77778 ms
[Dasher] AS-1 Rep 4 segment 79 done TOO LATE by 77778 ms
[Dasher] AS-1 Rep 13 segment 79 done TOO LATE by 77778 ms
[Dasher] AS-1 Rep 5 segment 79 done TOO LATE by 77778 ms
[Dasher] AS-1 Rep 14 segment 79 done TOO LATE by 77778 ms
[Dasher] AS-1 Rep 6 segment 79 done TOO LATE by 77778 ms
[Dasher] AS-1 Rep 15 segment 79 done TOO LATE by 77778 ms
[Dasher] AS-1 Rep 7 segment 79 done TOO LATE by 77778 ms
[Dasher] AS-1 Rep 16 segment 79 done TOO LATE by 77778 ms
[Dasher] AS-1 Rep 8 segment 79 done TOO LATE by 77778 ms
[Dasher] AS-1 Rep 17 segment 79 done TOO LATE by 77778 ms
[Dasher] AS-1 Rep 9 segment 79 done TOO LATE by 77778 ms
[Dasher] AS-1 Rep 18 segment 79 done TOO LATE by 77778 ms
[Dasher] AS-1 Rep 10 segment 79 done TOO LATE by 77779 ms
[Dasher] AS-1 Rep 19 segment 79 done TOO LATE by 77779 ms
[Dasher] AS-1 Rep 11 segment 79 done TOO LATE by 77779 ms
[Dasher] AS-1 Rep 20 segment 79 done TOO LATE by 77779 ms
this is computer setup

1.mp4 setup
Stream #0:0[0x1](und): Video: h264 (High) (avc1 / 0x31637661), yuv420p(tv, bt709, progressive), 1920x1080 [SAR 1:1 DAR 16:9], 36 kb/s, 23.98 fps, 23.98 tbr, 24k tbn (default)
ffmpeg version
ffmpeg version 4.4.git Copyright (c) 2000-2022 the FFmpeg developers
gpac version
gpac - GPAC command line filter engine - version 2.1-DEV-rev116-g3dbe11b37-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
| i want to ask RTMP to hevc tile some question | https://api.github.com/repos/gpac/gpac/issues/2180/comments | 4 | 2022-04-28T05:03:06Z | 2022-05-07T11:26:51Z | https://github.com/gpac/gpac/issues/2180 | 1,218,201,286 | 2,180 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
## Describe the bug
There is a heap-overflow bug in gf_utf8_wcslen, utils/utf.c:442, can be triggered via MP4Box+ ASan
## Step to reproduce
./configure --enable-sanitizer && make -j$(nproc)
./MP4Box -diso poc
## Sanitizer output
```
[isom] invalid tag size in Xtra !
[isom] not enough bytes in box Xtra: 4 left, reading 8 (file isomedia/box_code_base.c, line 12849), skipping box
[iso file] Box "Xtra" (start 24) has 4 extra bytes
[iso file] Read Box type 00000001 (0x00000001) at position 92 has size 0 but is not at root/file level. Forbidden, skipping end of parent box !
[iso file] Box "moof" (start 84) has 8 extra bytes
[iso file] Movie fragment but no moov (yet) - possibly broken parsing!
[iso file] Box "vwid" (start 204) has 5 extra bytes
[iso file] Unknown top-level box type 00000B01
[iso file] Incomplete box 00000B01 - start 264 size 34164724
[iso file] Incomplete file while reading for dump - aborting parsing
=================================================================
==2183542==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000011d6 at pc 0x7f95a4f4ec68 bp 0x7ffdfa692370 sp 0x7ffdfa692360
READ of size 2 at 0x6020000011d6 thread T0
#0 0x7f95a4f4ec67 in gf_utf8_wcslen utils/utf.c:442
#1 0x7f95a4f4ec67 in gf_utf8_wcslen utils/utf.c:438
#2 0x7f95a542a073 in xtra_box_dump isomedia/box_dump.c:6471
#3 0x7f95a543161d in gf_isom_box_dump isomedia/box_funcs.c:2108
#4 0x7f95a53f7dd9 in gf_isom_dump isomedia/box_dump.c:138
#5 0x55aea7254fbc in dump_isom_xml /home/hzheng/real-validate/gpac/applications/mp4box/filedump.c:2053
#6 0x55aea7239707 in mp4boxMain /home/hzheng/real-validate/gpac/applications/mp4box/main.c:6177
#7 0x7f95a2a160b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#8 0x55aea7215aed in _start (/home/hzheng/real-validate/gpac/bin/gcc/MP4Box+0xa9aed)
0x6020000011d6 is located 0 bytes to the right of 6-byte region [0x6020000011d0,0x6020000011d6)
allocated by thread T0 here:
#0 0x7f95a8767bc8 in malloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10dbc8)
#1 0x7f95a53dc17b in xtra_box_read isomedia/box_code_base.c:12875
#2 0x7f95a542d3c3 in gf_isom_box_read isomedia/box_funcs.c:1860
#3 0x7f95a542d3c3 in gf_isom_box_parse_ex isomedia/box_funcs.c:271
#4 0x7f95a542e815 in gf_isom_parse_root_box isomedia/box_funcs.c:38
#5 0x7f95a545789c in gf_isom_parse_movie_boxes_internal isomedia/isom_intern.c:373
#6 0x7f95a545da0f in gf_isom_parse_movie_boxes isomedia/isom_intern.c:860
#7 0x7f95a545da0f in gf_isom_open_file isomedia/isom_intern.c:980
#8 0x55aea723f1ed in mp4boxMain /home/hzheng/real-validate/gpac/applications/mp4box/main.c:5990
#9 0x7f95a2a160b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow utils/utf.c:442 in gf_utf8_wcslen
Shadow bytes around the buggy address:
0x0c047fff81e0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff81f0: fa fa 00 07 fa fa 07 fa fa fa fd fa fa fa 04 fa
0x0c047fff8200: fa fa 00 02 fa fa fd fa fa fa 00 07 fa fa 00 00
0x0c047fff8210: fa fa 00 00 fa fa 00 fa fa fa fd fa fa fa 00 04
0x0c047fff8220: fa fa 00 00 fa fa 00 fa fa fa 00 00 fa fa 01 fa
=>0x0c047fff8230: fa fa 06 fa fa fa 01 fa fa fa[06]fa fa fa 00 00
0x0c047fff8240: fa fa fd fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==2183542==ABORTING
```
## version
system: ubuntu 20.04.3 LTS
compiler: gcc 9.3.0
gpac version: latest commit https://github.com/gpac/gpac/commit/a4015fa4fc99fd3e7a62be0fe6bd565e1dded030
## Credit
Han Zheng
[NCNIPC of China](http://www.nipc.org.cn)
[Hexhive](http://hexhive.epfl.ch/)
## POC
[POC.zip](https://github.com/gpac/gpac/files/8555402/POC.zip)
| [BUG] heap buffer overflow in gf_utf8_wcslen, utils/utf.c:442 | https://api.github.com/repos/gpac/gpac/issues/2179/comments | 4 | 2022-04-25T14:26:20Z | 2023-03-07T12:37:47Z | https://github.com/gpac/gpac/issues/2179 | 1,214,594,854 | 2,179 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
How can I use a file present on a server as the input file for MP4Box command? I have the source url (something like `https://abcd.com/video/testing.mp4`. I want to use `dash` operation on this.
| MP4Box input file from server | https://api.github.com/repos/gpac/gpac/issues/2178/comments | 14 | 2022-04-20T10:35:40Z | 2022-04-20T14:50:49Z | https://github.com/gpac/gpac/issues/2178 | 1,209,497,928 | 2,178 |
[
"gpac",
"gpac"
] |

We have installed kvazaar on our Linux system for the tiling of 360-degree videos. After compiling and installing when we are trying to run any command, we are getting the following error. please help us resolve this.
`kvazaar: error while loading shared libraries: libkvazaar.so.7: cannot open shared object file: No such file or directory` | libkvazaar.so.7 error | https://api.github.com/repos/gpac/gpac/issues/2177/comments | 1 | 2022-04-18T14:44:01Z | 2022-04-18T15:06:27Z | https://github.com/gpac/gpac/issues/2177 | 1,207,119,804 | 2,177 |
[
"gpac",
"gpac"
] | [INSTALLED: windows latest mid-april 2022 GPAC dev versions]
OBJECTIVE: To find out the meaning of output message ~>> "[isom/avcc] Missing REXT profile signaling, patching."
I RUN:
mp4box -udta 1:type=name:str=homevid001 -udta 2:type=name:str=homeaud001 home001.mp4
In-place editing works brilliantly YET shows this:
" [isom/avcc] Missing REXT profile signaling, patching. "
May I ask if this is expected and normal... ??
HERE APPEARS TO BE THE SOURCE CODE WITH ENTIRE "Missing REXT..." MESSAGE IN IT - and more!-)
https://github.com/gpac/gpac/blob/275394b43a0a4516b88fc42cca2b9299004b50f8/src/isomedia/avc_ext.c
I wonder, why this gets output, and, can i ignore this?
~> " [isom/avcc] Missing REXT profile signaling, patching. "
Perplexed-) enough to stop until i know the answer. Comments asked for please and thanks.
I looked at the hexidecimal differences while trying several naming and renaming experiments.
Fascinating, yet there were enough changes that even study and searches couldn't help me understand.
THANK YOU for the read/think in absolutely any event. -) | "mp4box -udta ..." naming track IDs works YET outputs ~>[isom/avcc] Missing REXT profile signaling, patching. | https://api.github.com/repos/gpac/gpac/issues/2176/comments | 2 | 2022-04-17T09:39:53Z | 2022-04-19T11:10:50Z | https://github.com/gpac/gpac/issues/2176 | 1,206,329,469 | 2,176 |
[
"gpac",
"gpac"
] | # Description
When GPAC tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this funtion, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so is the length, which causes a buffer overflow.
```
char str[1024];
i=0;
str[0]=0;
while (1) {
str[i] = gf_bs_read_u8(bs);
if (!str[i]) break;
i++;
}
```
# Impact
Since video content is absolutely controllable by users, an unlimited length will cause stack overflow, corrupting canary or even get shell.
# Mitigation
We can just set a length limit to it, making it less than 1024 byte. See pull request https://github.com/gpac/gpac/pull/2174 .
# Reproduce
On Ubuntu 2004, make with this.
```
./configure --static-bin
make
```
Run the following command with POC.mp4.
```
$ MP4Box -info ./POC.mp4
```
You may get a stack smashing detectde error, which indicates that CANARY is crashed.
```
[BS] Attempt to overread bitstream
*** stack smashing detected ***: terminated
Aborted
```
GDB
```
*** stack smashing detected ***: terminated
Program received signal SIGABRT, Aborted.
0x0000000000aa31eb in raise ()
pwndbg> bt
#0 diST_box_read (s=0xdf4b00, bs=0xdf71e0) at isomedia/box_code_3gpp.c:1130
#1 0x000000000052e8c9 in gf_isom_box_read (bs=0xdf71e0, a=0xdf4b00) at isomedia/box_funcs.c:1832
#2 gf_isom_box_parse_ex (outBox=outBox@entry=0x7fffffff8540, bs=<optimized out>, bs@entry=0xdf71e0, parent_type=parent_type@entry=0, is_root_box=is_root_box@entry=GF_TRUE) at isomedia/box_funcs.c:264
#3 0x000000000052f070 in gf_isom_parse_root_box (outBox=outBox@entry=0x7fffffff8540, bs=0xdf71e0, box_type=box_type@entry=0x0, bytesExpected=bytesExpected@entry=0x7fffffff8590, progressive_mode=progressive_mode@entry=GF_FALSE) at isomedia/box_funcs.c:38
#4 0x0000000000536af8 in gf_isom_parse_movie_boxes_internal (mov=mov@entry=0xdf6fc0, boxType=boxType@entry=0x0, bytesMissing=bytesMissing@entry=0x7fffffff8590, progressive_mode=progressive_mode@entry=GF_FALSE) at isomedia/isom_intern.c:373
#5 0x0000000000538287 in gf_isom_parse_movie_boxes (progressive_mode=GF_FALSE, bytesMissing=0x7fffffff8590, boxType=0x0, mov=0xdf6fc0) at isomedia/isom_intern.c:852
#6 gf_isom_open_file (fileName=0x7fffffffe67d "../../../../crashes/1.mp4", OpenMode=<optimized out>, tmp_dir=0x0) at isomedia/isom_intern.c:972
#7 0x0000000000414dd4 in mp4boxMain (argc=<optimized out>, argv=<optimized out>) at main.c:5968
#8 0x0000000000a94000 in __libc_start_main ()
#9 0x0000000000402e6e in _start () at main.c:6585
```
# Credits
xdchase
# POC
[POC.zip](https://github.com/gpac/gpac/files/8499537/POC.zip)
| GPAC-2.0.0 MP4Box: stack overflow with unlimited length and controllable content in diST_box_read | https://api.github.com/repos/gpac/gpac/issues/2175/comments | 1 | 2022-04-16T08:21:46Z | 2022-04-22T18:29:03Z | https://github.com/gpac/gpac/issues/2175 | 1,206,053,267 | 2,175 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
## Describe the bug
There is a heap-overflow bug in gp_rtp_builder_do_hevc, can be triggered via MP4Box+ ASan
## Step to reproduce
./configure --enable-sanitizer && make -j$(nproc)
./MP4Box -hint -out /dev/null poc
## Sanitizer output
```
[iso file] Box "hvcC" (start 919) has 26 extra bytes
Hinting track ID 1 - Type "hvc1:hvc1" (H265) - BW 3 kbps
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 191 but only 3 bytes left in sample 11
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
[rtp hinter] Broken AVC nalu encapsulation: NALU size is 0, ignoring it
=================================================================
==2628578==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000001f15 at pc 0x7f14c2411bf5 bp 0x7ffec49a0110 sp 0x7ffec49a0100
READ of size 1 at 0x602000001f15 thread T0
#0 0x7f14c2411bf4 in gp_rtp_builder_do_hevc ietf/rtp_pck_mpeg4.c:594
#1 0x7f14c29c1da6 in gf_hinter_track_process media_tools/isom_hinter.c:834
#2 0x561e3a6f0d97 in HintFile /home/hzheng/real-validate/gpac/applications/mp4box/main.c:3613
#3 0x561e3a6f857b in mp4boxMain /home/hzheng/real-validate/gpac/applications/mp4box/main.c:6481
#4 0x7f14bfb8b0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#5 0x561e3a6d0aed in _start (/home/hzheng/real-validate/gpac/bin/gcc/MP4Box+0xa9aed)
0x602000001f15 is located 0 bytes to the right of 5-byte region [0x602000001f10,0x602000001f15)
allocated by thread T0 here:
#0 0x7f14c58d9bc8 in malloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10dbc8)
#1 0x7f14c268782d in Media_GetSample isomedia/media.c:623
#2 0x7f14c25e6e5c in gf_isom_get_sample_ex isomedia/isom_read.c:1905
#3 0x7f14c29c16bd in gf_hinter_track_process media_tools/isom_hinter.c:756
#4 0x561e3a6f0d97 in HintFile /home/hzheng/real-validate/gpac/applications/mp4box/main.c:3613
#5 0x561e3a6f857b in mp4boxMain /home/hzheng/real-validate/gpac/applications/mp4box/main.c:6481
#6 0x7f14bfb8b0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow ietf/rtp_pck_mpeg4.c:594 in gp_rtp_builder_do_hevc
Shadow bytes around the buggy address:
0x0c047fff8390: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff83a0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff83b0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff83c0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff83d0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
=>0x0c047fff83e0: fa fa[05]fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff83f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8400: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8410: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8420: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8430: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==2628578==ABORTING
```
## version
system: ubuntu 20.04.3 LTS
compiler: gcc 9.3.0
gpac version: latest commit 6dcba5347cd12372225fc47080bc6e770fc4bb1b
```
MP4Box - GPAC version 2.1-DEV-rev114-g6dcba5347-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
## Credit
Han Zheng
[NCNIPC of China](http://www.nipc.org.cn)
[Hexhive](http://hexhive.epfl.ch/)
## POC
[crash.zip](https://github.com/gpac/gpac/files/8499508/crash.zip)
| [BUG] heap buffer overflow in gp_rtp_builder_do_hevc | https://api.github.com/repos/gpac/gpac/issues/2173/comments | 0 | 2022-04-16T08:01:38Z | 2022-08-03T09:45:02Z | https://github.com/gpac/gpac/issues/2173 | 1,206,048,984 | 2,173 |
[
"gpac",
"gpac"
] | I'm using MP4Box to tag some AAC audio files (using the **-itags option**) and I'm having difficulty getting the Genre metadata to display in the players that I've tested the files in.
The other metadata fields are showing up across all players, but Genre does not show in iTunes, Windows Media Player, VLC, or Audacity. Editing the internal "tag" of the genre from "©gnr" to "©gen" allows the Genre to show in Windows Media Player, VLC, and Audacity, but it still does not display in iTunes. This change is a binary edit, and I haven't found a way to do this in MP4Box.
Is there another way that we need to add Genre metadata so it shows consistently across all players?
**Environment:**
Windows64
GPAC version - latest nightly build: version 2.1-DEV-rev74-gfa127347-master
| MP4Box genre metadata tags not displaying across different players | https://api.github.com/repos/gpac/gpac/issues/2172/comments | 1 | 2022-04-14T22:00:28Z | 2022-04-19T12:29:36Z | https://github.com/gpac/gpac/issues/2172 | 1,205,049,562 | 2,172 |
[
"gpac",
"gpac"
] | It seems like example in [dash-low-latency-live-encoding](https://github.com/gpac/gpac/wiki/dash_low_latency#dash-low-latency-live-encoding) cannot work correctly when simply change input to RTMP. The command I use is:
```
gpac \
-i rtmp://127.0.0.1:1935/live/test:gpac:rtmp_listen=1:FID=1 \
ffsws:osize=1920x1080:SID=1 @ enc:c=avc:fintra=1:FID=EV1:b=6m \
ffsws:osize=1280x720:SID=1 @ enc:c=avc:fintra=1:FID=EV2:b=3m \
enc:ffc=aac:SID=1:FID=EA:b=128k \
-o http://127.0.0.1:8080/live.mpd:gpac:SID\=EV1,EV2,EA \
--hmode=push --profile=live --segdur=1 --cdur=0.1 --asto=0.9
```
`gpac` printed following outputs:
```
[Eval] Undefined constant or missing '(' in 'live'
[aac] Unable to parse option value "live"
[aac] Error setting option profile to value live.
[FFDec] PID audio1 failed to open codec context: Invalid argument
Failed to connect filter ffdmx PID audio1 to filter ffdec: BitStream Not Compliant
Blacklisting ffdec as output from ffdmx and retrying connections
[Eval] Undefined constant or missing '(' in 'live'
[h264] Unable to parse option value "live"
[h264] Error setting option profile to value live.
[FFDec] PID video1 failed to open codec context: Invalid argument
Failed to connect filter ffdmx PID video1 to filter ffdec: BitStream Not Compliant
Blacklisting ffdec as output from ffdmx and retrying connections
[FFEnc] No codecid specified
Failed to connect filter dec_faad:FAAD2 PID audio1 to filter ffenc: Bad Parameter
x264 [error]: invalid profile: live
[libx264] Error setting profile live.
[FFEnc] PID video1 failed to open codec context: Invalid argument
Failed to connect filter ffsws PID video1 to filter ffenc:libx264: Bad Parameter
x264 [error]: invalid profile: live
[libx264] Error setting profile live.
[FFEnc] PID video1 failed to open codec context: Invalid argument
Failed to connect filter ffsws PID video1 to filter ffenc:libx264: Bad Parameter
session last connect error Bad Parameter
Unknown argument "--profile" set but not used by any filter - no matching argument found
Argument "--segdur" was set but not used by any filter
Argument "--cdur" was set but not used by any filter
Argument "--asto" was set but not used by any filter
Filters not connected:
httpout (dst=http://127.0.0.1:8080/live.mpd:gpac:SID=EV1,EV2,EA) (idx=7)
```
I found that this error is wrong parameters was given to `gpac`. I want to know how can I do the same thing by correct command? I have tried many commands. Thank you very much
| RTMP input cannot encode in multi-qualitis by using given example | https://api.github.com/repos/gpac/gpac/issues/2171/comments | 6 | 2022-04-14T15:33:57Z | 2022-04-15T16:00:18Z | https://github.com/gpac/gpac/issues/2171 | 1,204,684,755 | 2,171 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
I'm trying to convert a .mp4 file to play with dash.js with video, two audio track and two or more subtitle tracks. resulted files and mpd play fine with one subtitle only, as soon as i had a second subtitle track, it is unsynced.
OS is Linux Slackware 15.0
```
# MP4Box -version
MP4Box - GPAC version 2.0-revrelease
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --prefix=/usr --mandir=/usr/man --disable-opt --enable-pic --enable-pulseaudio --cpu=x86_64 --extra-cflags=-O2 -fPIC --disable-wx --disable-amr
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_MAD GPAC_HAS_LIBA52 GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_FFMPEG GPAC_HAS_JP2 GPAC_HAS_THEORA GPAC_HAS_VORBIS GPAC_HAS_LINUX_DVB
```
My MP4 source test.mp4. MP4Box - MP4Box -info test.mp4 :
```
[isom/avcc] Missing REXT profile signaling, patching.
[iso file] Found stts entry with sample_delta=0 - forbidden ! Fixing to 1 <repeated several times>
# Movie Info - 5 tracks - TimeScale 1000
Duration 01:49:49.590 (recomputed 01:49:49.589)
Fragmented: no
Progressive (moov before mdat)
Major Brand mp42 - version 512 - compatible brands: mp42 iso2 avc1 mp41
Created: GMT Fri Apr 1 12:33:24 2022
iTunes Info:
title: Test
tool: HandBrake 1.5.1 2022011100
# Track 1 Info - ID 1 - TimeScale 90000
Media Duration 01:49:49.583 (recomputed 01:49:49.666)
Track has 1 edits: track duration is 01:49:49.583
Track flags: Enabled In Movie
Media Info: Language "Undetermined (und)" - Type "vide:avc1" - 157992 samples
Visual Sample Entry Info: width=1280 height=720 (depth=24 bits)
Visual Track layout: x=0 y=0 width=1329 height=720
AVC/H264 Video - Visual Size 1280 x 720
AVC Info: 1 SPS - 1 PPS - Profile High @ Level 3.1
NAL Unit length bits: 32
Pixel Aspect Ratio 27:26 - Indicated track size 1329 x 720
Chroma format YUV 4:2:0 - Luma bit depth 8 - chroma bit depth 8
SPS#1 hash: 6208DEE775C5F3D73DE353432F02A82428672143
PPS#1 hash: 388BF4B817C1896AC1198BB370180C1101833A4F
RFC6381 Codec Parameters: avc1.64001F
Average GOP length: 115 samples
Max sample duration: 3754 / 90000
# Track 2 Info - ID 2 - TimeScale 48000
Media Duration 01:49:49.568 (recomputed 01:49:49.589)
Track has 1 edits: track duration is 01:49:49.568
Track flags: Enabled In Movie
Media Info: Language "French (fra)" - Type "soun:mp4a" - 308887 samples
2 UDTA types:
name: Stereo
titl: unknown type (13 bytes)
Alternate Group ID 1
MPEG-4 Audio AAC LC (AOT=2 implicit) - 2 Channel(s) - SampleRate 48000
RFC6381 Codec Parameters: mp4a.40.2
All samples are sync
Max sample duration: 1024 / 48000
# Track 3 Info - ID 3 - TimeScale 48000
Media Duration 01:49:49.589 (recomputed 01:49:49.610)
Track has 1 edits: track duration is 01:49:49.589
Track flags: Disabled In Movie
Media Info: Language "English (eng)" - Type "soun:mp4a" - 308888 samples
2 UDTA types:
name: Stereo
titl: unknown type (13 bytes)
Alternate Group ID 1
MPEG-4 Audio AAC LC (AOT=2 implicit) - 2 Channel(s) - SampleRate 48000
RFC6381 Codec Parameters: mp4a.40.2
All samples are sync
Max sample duration: 1024 / 48000
# Track 4 Info - ID 4 - TimeScale 90000
Media Duration 01:41:38.933 (recomputed 01:41:38.933)
Track has 1 edits: track duration is 01:41:38.933
Track flags: Enabled In Movie
Media Info: Language "French (fra)" - Type "sbtl:tx3g" - 550 samples
2 UDTA types:
name: Forced
titl: unknown type (13 bytes)
Alternate Group ID 3
QT/3GPP subtitle
Size 1329 x 108 - Translation X=0 Y=0 - Layer 0
RFC6381 Codec Parameters: tx3g
All samples are sync
Max sample duration: 77000760 / 90000
# Track 5 Info - ID 5 - TimeScale 90000
Media Duration 01:49:47.839 (recomputed 01:49:47.839)
Track has 1 edits: track duration is 01:49:47.839
Track flags: Disabled In Movie
Media Info: Language "French (fra)" - Type "sbtl:tx3g" - 3001 samples
2 UDTA types:
name: French
titl: unknown type (13 bytes)
Alternate Group ID 3
QT/3GPP subtitle
Size 1329 x 108 - Translation X=0 Y=0 - Layer 0
RFC6381 Codec Parameters: tx3g
All samples are sync
Max sample duration: 43821360 / 90000
```
Extracting subtitles in srt with MP4Box:
MP4Box -srt 4 test.mp4
MP4Box -srt 5 test.mp4
```
[iso file] Found stts entry with sample_delta=0 - forbidden ! Fixing to 1 <repeated several times>
Conversion done
```
At this point if i add only one subtitle, the finale mpd file play fine and subtitle are in sync.
Adding WebVTT to test.mp4:
```
MP4Box -add test_4_text.srt:FMT=VTT:lang=fr+test_5_text.srt:FMT=VTT:lang=fr test.mp4
[isom/avcc] Missing REXT profile signaling, patching.
[iso file] Found stts entry with sample_delta=0 - forbidden ! Fixing to 1 <repeated several times>
Track Importing WebVTT - Text track 1329 x 720 layer 0
Track Importing WebVTT - Text track 1329 x 720 layer 0
Saving test.mp4: 0.500 secs Interleaving
```
Create mpd and files:
```
$ MP4Box -dash 10000 -profile dashavc264:onDemand test.mp4#trackID=1:id=video test.mp4#trackID=2:id=fre test.mp4#trackID=3:id=eng test.mp4#trackID=6:id=fr_forced:role=forced-subtitle test.mp4#trackID=7:id=fr_full:role=subtitle -out test.mpd
[Dasher] No template assigned, using $File$_dash$FS$$Number$
[MP4Mux] PID T7 ID 7 Sample 139 with DTS 295337 less than previous sample DTS 300000, adjusting prev sample duration <repeated several times>
[Dasher] Adaptation sets in period are of unequal duration min 6098.93 max 6589.59 seconds
[MPD] Generating MPD at time 2022-04-12T13:13:27.083Z
[Dasher] End of Period
[Dasher] End of MPD (no more active streams)
```
MP4Box don't output the messages below with one subtitle track
```
[MP4Mux] PID T7 ID 7 Sample 139 with DTS 295337 less than previous sample DTS 300000, adjusting prev sample duration
[MP4Mux] PID T7 ID 7 Sample 141 with DTS 300709 less than previous sample DTS 314663, adjusting prev sample duration
[MP4Mux] PID T7 ID 7 Sample 143 with DTS 313921 less than previous sample DTS 333954, adjusting prev sample duration
[MP4Mux] PID T7 ID 7 Sample 145 with DTS 320083 less than previous sample DTS 350033, adjusting prev sample duration
```
Can't figure out what i'm doing wrong, is the source file not properly encoded or i'm missing some command argument ?
| Adding a second subtitle track generate error messages | https://api.github.com/repos/gpac/gpac/issues/2170/comments | 5 | 2022-04-12T13:32:07Z | 2022-05-17T06:36:53Z | https://github.com/gpac/gpac/issues/2170 | 1,201,858,545 | 2,170 |
[
"gpac",
"gpac"
] | Raised in #2167 where the Python part of the doc was empty after the code was moved. Could we check that? Thx | Check doxygen_warnings.txt is empty when generating doc | https://api.github.com/repos/gpac/gpac/issues/2169/comments | 1 | 2022-04-10T15:46:48Z | 2022-04-12T13:05:29Z | https://github.com/gpac/gpac/issues/2169 | 1,199,079,989 | 2,169 |
[
"gpac",
"gpac"
] | Hello,
I'm trying to play a video in VR mode using HEVC and DASH SRD as follows:
`gpac -i DoiSuthep_dash_22_50.mpd#VR @ compositor @ vout`
But after a few seconds the video seems to have colour conversion issues as shown below:

The manifest was made following [this](https://github.com/gpac/gpac/wiki/HEVC-Tile-based-adaptation-guide) tutorial. It has two qualities and it seems that the problem happens when it has a quality change, but I am not quite sure.
I have found a similar issue #1919, but his solution did not work for me.
Any help will be very appreciate it.
OS: Windows 10
GPAC: version 2.1-DEV-rev90-g1dc48009a-master
<hr>
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
| Colour convertion bug playing tiled video in VR using HEVC and DASH SRD | https://api.github.com/repos/gpac/gpac/issues/2168/comments | 4 | 2022-04-09T21:55:47Z | 2022-04-14T18:36:57Z | https://github.com/gpac/gpac/issues/2168 | 1,198,782,881 | 2,168 |
[
"gpac",
"gpac"
] | 
I want to make my own mpeg dash ABS
I want to know the user environment bandwidth and total use Bandwidth for playing HEVC TILE video | Python APIs where is it | https://api.github.com/repos/gpac/gpac/issues/2167/comments | 7 | 2022-04-09T13:00:17Z | 2022-04-12T08:59:07Z | https://github.com/gpac/gpac/issues/2167 | 1,198,586,726 | 2,167 |
[
"gpac",
"gpac"
] | **version info:**
```
root@d8a714203f6e:# ./MP4Box -version
MP4Box - GPAC version 2.1-DEV-rev87-g053aae8-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --prefix=/path_to_gpac/build --enable-debug --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_FAAD GPAC_HAS_MAD GPAC_HAS_LIBA52 GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_FFMPEG GPAC_HAS_JP2 GPAC_HAS_THEORA GPAC_HAS_VORBIS GPAC_HAS_XVID GPAC_HAS_LINUX_DVB
```
**poc:** [poc]()
**command:** MP4Box -hint -out /dev/null $poc$
Here is the trace reported by ASAN:
```
root@d8a714203f6e:# ./MP4Box -hint -out /dev/null poc
==27771==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60600001c200 at pc 0x7f61f6ce996d bp 0x7ffc4d4c1900 sp 0x7ffc4d4c18f0
WRITE of size 1 at 0x60600001c200 thread T0
#0 0x7f61f6ce996c in gf_isom_add_sample_aux_info_internal isomedia/isom_write.c:8515
#1 0x7f61f6daffc3 in MergeTrack isomedia/track.c:1208
#2 0x7f61f6bfe1d7 in MergeFragment isomedia/isom_intern.c:92
#3 0x7f61f6c089ae in gf_isom_parse_movie_boxes_internal isomedia/isom_intern.c:713
#4 0x7f61f6c0a80f in gf_isom_parse_movie_boxes isomedia/isom_intern.c:859
#5 0x7f61f6c0b31c in gf_isom_open_file isomedia/isom_intern.c:979
#6 0x7f61f6c175da in gf_isom_open isomedia/isom_read.c:520
#7 0x43ea06 in mp4boxMain /path_to_gpac/applications/mp4box/main.c:5977
#8 0x4416c3 in main /path_to_gpac/applications/mp4box/main.c:6594
#9 0x7f61f308983f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#10 0x40fd28 in _start (/path_to_gpac/build-ASAN/bin/MP4Box+0x40fd28)
0x60600001c200 is located 0 bytes to the right of 64-byte region [0x60600001c1c0,0x60600001c200)
allocated by thread T0 here:
#0 0x7f61fb586961 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98961)
#1 0x7f61f644565c in gf_realloc utils/alloc.c:160
#2 0x7f61f6ce95b6 in gf_isom_add_sample_aux_info_internal isomedia/isom_write.c:8506
#3 0x7f61f6daffc3 in MergeTrack isomedia/track.c:1208
#4 0x7f61f6bfe1d7 in MergeFragment isomedia/isom_intern.c:92
#5 0x7f61f6c089ae in gf_isom_parse_movie_boxes_internal isomedia/isom_intern.c:713
#6 0x7f61f6c0a80f in gf_isom_parse_movie_boxes isomedia/isom_intern.c:859
#7 0x7f61f6c0b31c in gf_isom_open_file isomedia/isom_intern.c:979
#8 0x7f61f6c175da in gf_isom_open isomedia/isom_read.c:520
#9 0x43ea06 in mp4boxMain /path_to_gpac/applications/mp4box/main.c:5977
#10 0x4416c3 in main /path_to_gpac/applications/mp4box/main.c:6594
#11 0x7f61f308983f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
SUMMARY: AddressSanitizer: heap-buffer-overflow isomedia/isom_write.c:8515 gf_isom_add_sample_aux_info_internal
```
When `sampleNumber=76` and `saiz->sample_alloc=32`, `saiz->sample_alloc` will double to 64 at line 8505. Therefore, `saiz->sample_info_size` points to a heap chunk of **64** bytes ( line 8506 ).
On lines 8514-8515, the loop is controlled by `sampleNumber`, which accesses the data in `saiz->sample_info_size` up to the **75th** byte, causing a heap buffer overflow vulnerability.
This is mainly due to the **missing checks** for `sampleNumber` and `saiz->sample_alloc` .
https://github.com/gpac/gpac/blob/1dc48009a49bc495c119377a40a1226a1e480564/src/isomedia/isom_write.c#L8503-L8515
| AddressSanitizer: heap-buffer-overflow in gf_isom_add_sample_aux_info_internal, isomedia/isom_write.c:8515 | https://api.github.com/repos/gpac/gpac/issues/2166/comments | 3 | 2022-04-08T09:01:21Z | 2022-04-12T11:27:28Z | https://github.com/gpac/gpac/issues/2166 | 1,197,040,939 | 2,166 |
[
"gpac",
"gpac"
] | **version info:**
```
root@d8a714203f6e:# ./MP4Box -version
MP4Box - GPAC version 2.1-DEV-rev87-g053aae8-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --prefix=/path_to_gpac/build --enable-debug --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_FAAD GPAC_HAS_MAD GPAC_HAS_LIBA52 GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_FFMPEG GPAC_HAS_JP2 GPAC_HAS_THEORA GPAC_HAS_VORBIS GPAC_HAS_XVID GPAC_HAS_LINUX_DVB
```
**poc:** [poc](https://github.com/dandanxu96/PoC/raw/main/gpac/gpac-BS_ReadByte-Assertion-failed-poc)
**command:** MP4Box -hint -out /dev/null $poc$
**crash:**
```
root@d8a714203f6e:# ./MP4Box -hint -out /dev/null poc
[iso file] Unknown box type a}EF95
[iso file] Unknown box type a}EF95
[iso file] Unknown box type a}EF95
[iso file] Box "abst" (start 4730) has 79 extra bytes
[BS] Attempt to overread bitstream
MP4Box: utils/bitstream.c:383: BS_ReadByte: Assertion `bs->position<=bs->size' failed.
Aborted
``` | Assertion failed in BS_ReadByte, utils/bitstream.c:383 | https://api.github.com/repos/gpac/gpac/issues/2165/comments | 0 | 2022-04-08T08:28:19Z | 2022-04-12T09:01:22Z | https://github.com/gpac/gpac/issues/2165 | 1,197,007,820 | 2,165 |
[
"gpac",
"gpac"
] | poc.py is available [here](https://drive.google.com/file/d/1iH28RyOdIbMDdUONKZSBbJU0Y6QiAEl_/view?usp=sharing)
```
Description
A malicious server can trigger an out-of-bounds heap write via a specially crafted SDP packet due to no bounds check when parsing time zone information into the AdjustmentTime and AdjustmentOffset fields of GF_SDPTiming.
(terminal 1)
python3 poc.py 31337
(terminal 2)
./configure --enable-sanitizer
make -j32
./bin/gcc/gpac -play rtsp://127.0.0.1:31337/test
ietf/sdp.c:624:27: runtime error: index 10 out of bounds for type 'u32 [10]'
GDB
Thread 1 "gpac" received signal SIGSEGV, Segmentation fault.
0x00007ffff7828932 in gf_sdp_info_parse () from /gpac/bin/gcc/libgpac.so.11
(gdb) bt
#0 0x00007ffff7828932 in gf_sdp_info_parse () at /gpac/bin/gcc/libgpac.so.11
#1 0x00007ffff7be6020 in rtpin_load_sdp () at /gpac/bin/gcc/libgpac.so.11
#2 0x00007ffff7be6d6c in rtpin_rtsp_describe_process () at /gpac/bin/gcc/libgpac.so.11
#3 0x00007ffff7be493b in rtpin_rtsp_process_commands () at /gpac/bin/gcc/libgpac.so.11
#4 0x00007ffff7be3d56 in rtpin_process () at /gpac/bin/gcc/libgpac.so.11
#5 0x00007ffff7b47945 in gf_filter_process_task () at /gpac/bin/gcc/libgpac.so.11
#6 0x00007ffff7b34e67 in gf_fs_thread_proc () at /gpac/bin/gcc/libgpac.so.11
#7 0x00007ffff7b39e1b in gf_fs_run () at /gpac/bin/gcc/libgpac.so.11
#8 0x0000555555563a43 in gpac_main ()
#9 0x00007ffff744c310 in __libc_start_call_main () at /usr/lib/libc.so.6
#10 0x00007ffff744c3c1 in __libc_start_main_impl () at /usr/lib/libc.so.6
#11 0x0000555555559dc5 in _start ()
Impact
This is capable of causing crashes and allowing modification of heap memory which could lead to remote code execution.
Occurrences
sdp.c L626
Lack of bounds check on write to fixed size, heap allocated field
``` | Controlled heap buffer overflow in SDP packet parsing | https://api.github.com/repos/gpac/gpac/issues/2164/comments | 2 | 2022-04-04T08:02:09Z | 2022-04-12T08:40:25Z | https://github.com/gpac/gpac/issues/2164 | 1,191,405,764 | 2,164 |
[
"gpac",
"gpac"
] | **version info:**
```
root@d8a714203f6e:# ./MP4Box -version
MP4Box - GPAC version 2.1-DEV-rev87-g053aae8-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --prefix=/path_to_gpac/build --enable-debug --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_FAAD GPAC_HAS_MAD GPAC_HAS_LIBA52 GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_FFMPEG GPAC_HAS_JP2 GPAC_HAS_THEORA GPAC_HAS_VORBIS GPAC_HAS_XVID GPAC_HAS_LINUX_DVB
```
**poc:**[poc](https://github.com/dandanxu96/PoC/raw/main/gpac/gpac-gf_isom_parse_movie_boxes-null-pointer-dereference-poc)
**command:** MP4Box -hint -out /dev/null $poc$
**crash:**
```
root@d8a714203f6e:# ./MP4Box -hint -out /dev/null poc
[iso file] Read Box type 00000000 (0x00000000) at position 45 has size 0 but is not at root/file level. Forbidden, skipping end of parent box !
[iso file] Read Box "abst" (start 0) failed (Unknown Error (10)) - skipping
isomedia/isom_intern.c:392:12: runtime error: member access within null pointer of type 'struct GF_Box'
```
When `size=0` and `is_root_box=false`, `gf_isom_box_parse_ex` will return `GF_SKIP_BOX` (i.e., 10) at line 138 of box_funcs.c.
https://github.com/gpac/gpac/blob/7f060bbb72966cae80d6fee338d0b07fa3fc06e1/src/isomedia/box_funcs.c#L129-L142
This will cause `*outBox` to be set to NULL (in box_funcs.c:312) and the return value `GF_SKIP_BOX` will be passed to the upper function ( in box_funcs.c:318).
https://github.com/gpac/gpac/blob/7f060bbb72966cae80d6fee338d0b07fa3fc06e1/src/isomedia/box_funcs.c#L310-L319
The program now executes the empty if block when `e>=0`( in isom_intern.c:375-377), and later dereferences the null pointer in line 392 of isom_intern.c.
https://github.com/gpac/gpac/blob/7f060bbb72966cae80d6fee338d0b07fa3fc06e1/src/isomedia/isom_intern.c#L373-L392
Note that although the crash path is the same as in issue #2155, their root cause is different. | NULL Pointer Dereference still exists in gf_isom_parse_movie_boxes_internal | https://api.github.com/repos/gpac/gpac/issues/2163/comments | 1 | 2022-04-01T12:17:54Z | 2022-04-12T09:01:21Z | https://github.com/gpac/gpac/issues/2163 | 1,189,714,047 | 2,163 |
[
"gpac",
"gpac"
] | poc.py is available [here](https://drive.google.com/file/d/1iH28RyOdIbMDdUONKZSBbJU0Y6QiAEl_/view?usp=sharing)
```
Description
A malicious server can trigger an out-of-bounds heap write via a specially crafted SDP packet due to no bounds check when parsing time zone information into the AdjustmentTime and AdjustmentOffset fields of GF_SDPTiming.
Proof of Concept
(terminal 1)
python3 poc.py 31337
(terminal 2)
./configure --enable-sanitizer
make -j32
./bin/gcc/gpac -play rtsp://127.0.0.1:31337/test
ietf/sdp.c:624:27: runtime error: index 10 out of bounds for type 'u32 [10]'
GDB
Thread 1 "gpac" received signal SIGSEGV, Segmentation fault.
0x00007ffff7828932 in gf_sdp_info_parse () from /gpac/bin/gcc/libgpac.so.11
(gdb) bt
#0 0x00007ffff7828932 in gf_sdp_info_parse () at /gpac/bin/gcc/libgpac.so.11
#1 0x00007ffff7be6020 in rtpin_load_sdp () at /gpac/bin/gcc/libgpac.so.11
#2 0x00007ffff7be6d6c in rtpin_rtsp_describe_process () at /gpac/bin/gcc/libgpac.so.11
#3 0x00007ffff7be493b in rtpin_rtsp_process_commands () at /gpac/bin/gcc/libgpac.so.11
#4 0x00007ffff7be3d56 in rtpin_process () at /gpac/bin/gcc/libgpac.so.11
#5 0x00007ffff7b47945 in gf_filter_process_task () at /gpac/bin/gcc/libgpac.so.11
#6 0x00007ffff7b34e67 in gf_fs_thread_proc () at /gpac/bin/gcc/libgpac.so.11
#7 0x00007ffff7b39e1b in gf_fs_run () at /gpac/bin/gcc/libgpac.so.11
#8 0x0000555555563a43 in gpac_main ()
#9 0x00007ffff744c310 in __libc_start_call_main () at /usr/lib/libc.so.6
#10 0x00007ffff744c3c1 in __libc_start_main_impl () at /usr/lib/libc.so.6
#11 0x0000555555559dc5 in _start ()
Impact
This is capable of causing crashes and allowing modification of heap memory which could lead to remote code execution.
Occurrences
sdp.c L626
Lack of bounds check on write to fixed size, heap allocated field
``` | Controlled heap buffer overflow in SDP packet parsing | https://api.github.com/repos/gpac/gpac/issues/2162/comments | 0 | 2022-04-01T07:35:21Z | 2022-04-11T16:32:35Z | https://github.com/gpac/gpac/issues/2162 | 1,189,381,531 | 2,162 |
[
"gpac",
"gpac"
] | Python support in GPAC 2.2 is incomplete: it needs the package installer (pip). So we can install the library ("pip install gpac"). Manual installation of Python modules is strongly discouraged by the Python Packaging Authority (PyPA). Thanks. | GPAC 2.2 - Python support incomplete - needs package installer (pip) | https://api.github.com/repos/gpac/gpac/issues/2161/comments | 1 | 2022-03-31T18:03:47Z | 2022-05-16T10:10:58Z | https://github.com/gpac/gpac/issues/2161 | 1,188,444,928 | 2,161 |
[
"gpac",
"gpac"
] | I am trying to do tiling using this command.
MP4Box -dash 1000 [other dash params] source.mp4:desc_as=<SupplementalProperty schemeIdUri=\"urn:mpeg:dash:srd:2014\" value=\"0,0,1,1,1,2,2\"/>
but this is showing a syntax error every time I implement this. Different other params were also tried but every time the same issue persist. I have also attached my version of the GPAC. version 2.0. if some help can be provided that would be really appreciated.
<img width="671" alt="image" src="https://user-images.githubusercontent.com/74789273/161098498-4e1dc736-4636-4989-b7ae-80254fb9ba62.png">
<img width="415" alt="image" src="https://user-images.githubusercontent.com/74789273/161098858-5bef2f05-aa5f-4542-9434-6284f0608fa3.png">
| Syntax not valid issue. | https://api.github.com/repos/gpac/gpac/issues/2160/comments | 4 | 2022-03-31T16:01:24Z | 2022-04-12T11:04:19Z | https://github.com/gpac/gpac/issues/2160 | 1,188,308,737 | 2,160 |
[
"gpac",
"gpac"
] | [POC](https://mega.nz/file/K9J1xIja#EKR-ls4tmAMFoXzHnWIxBA7fqzgFXcDgEUqFC2c5tUc)
```
Description
A inf loop security issue in gpac/gpac
Proof of Concept
The issue occurs in code: src/media_tools/avilib.c#L1974, when the gpac avidmx filter parses the AVI format file.
choose a simple AVI format file, the data's header is as follows in xxd mode
$ xxd ./1.avi | head -n 2
00000000: 5249 4646 e81b 0100 4156 4920 4c49 5354 RIFF....AVI LIST
00000010: c222 0000 6864 726c 6176 6968 3800 0000 ."..hdrlavih8...
Use vim in xxd mode, to change the header's size member hex data to 0xfffffff8(-8), the modified data is as follows
$ xxd ./1.avi| head -n 2
00000000: 5249 4646 e81b 0100 4156 4920 4c49 5354 RIFF....AVI LIST
00000010: c222 0000 6864 726c 6176 6968 f8ff ffff ."..hdrlavih....
Then run command with avidmx filter, you will observe an inf loop situation.
./gpac -i ./1.avi -o 123 avidmx
Its stack backtrack is as follow
#0 __strncasecmp_l_avx () at ../sysdeps/x86_64/multiarch/strcmp-sse42.S:166
#1 0x00007ffff7a5c62c in avi_parse_input_file.part () from /mnt/data/gpac/gpac-32/bin/gcc/libgpac.so.11
#2 0x00007ffff7a5e9f7 in AVI_open_input_file () from /mnt/data/gpac/gpac-32/bin/gcc/libgpac.so.11
#3 0x00007ffff7bf11d9 in avidmx_process () from /mnt/data/gpac/gpac-32/bin/gcc/libgpac.so.11
#4 0x00007ffff7baced0 in gf_filter_process_task () from /mnt/data/gpac/gpac-32/bin/gcc/libgpac.so.11
#5 0x00007ffff7b9abc4 in gf_fs_thread_proc () from /mnt/data/gpac/gpac-32/bin/gcc/libgpac.so.11
#6 0x00007ffff7b9fb2b in gf_fs_run () from /mnt/data/gpac/gpac-32/bin/gcc/libgpac.so.11
#7 0x0000555555564a5a in gpac_main ()
Occurrences
avilib.c L1974
``` | Infinite loop | https://api.github.com/repos/gpac/gpac/issues/2159/comments | 0 | 2022-03-31T08:32:28Z | 2022-03-31T11:57:10Z | https://github.com/gpac/gpac/issues/2159 | 1,187,707,067 | 2,159 |
[
"gpac",
"gpac"
] | Hi,
Do you have in your roadmap add support to SCTE-35?
If not.... I can do it, but maybe I need help to know the project structure.
Thanks and awesome project!
| Add Support to SCTE - 35 | https://api.github.com/repos/gpac/gpac/issues/2158/comments | 11 | 2022-03-30T19:10:32Z | 2024-05-27T22:01:36Z | https://github.com/gpac/gpac/issues/2158 | 1,186,877,696 | 2,158 |
[
"gpac",
"gpac"
] | Hello, I successfully installed the osmo4 apk in oculus quest2, and i can open the osmo4. But there is no response when I click on icons. Any ideas about this? Thanks
| Osmo4 does not work in Oculus quest 2 | https://api.github.com/repos/gpac/gpac/issues/2157/comments | 1 | 2022-03-30T17:54:16Z | 2022-04-12T09:04:29Z | https://github.com/gpac/gpac/issues/2157 | 1,186,796,778 | 2,157 |
[
"gpac",
"gpac"
] | **Description**
A NULL pointer dereference vulnerability in `gf_isom_parse_movie_boxes_internal` function (`isomedia/isom_intern.c:392`) due to a missing check before using the pointer.
**Version**
```bash
MP4Box -version
MP4Box - GPAC version 2.1-DEV-rev79-gdf29bc8a0-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
**POC**
```bash
MP4Box -zmov poc
```
**URL:** https://www.mediafire.com/file/z6v36ozs8lvtzll/poc/file
**ASAN**
```bash
$ MP4Box -zmov ../poc
[iso file] Box 0000 size 808464432 is larger than remaining parent size 11439
[iso file] Read Box type esds (0x65736473) at position 0 has size 0 but is not at root/file level. Forbidden, skipping end of parent box !
[iso file] Read Box "mp4a" (start 20) failed (Unknown Error (10)) - skipping
AddressSanitizer:DEADLYSIGNAL
=================================================================
==19277==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fcb9e84f09c bp 0x7fff1524d410 sp 0x7fff1524d360 T0)
==19277==The signal is caused by a READ memory access.
==19277==Hint: address points to the zero page.
#0 0x7fcb9e84f09c in gf_isom_parse_movie_boxes_internal isomedia/isom_intern.c:392
#1 0x7fcb9e850ad5 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:859
#2 0x7fcb9e850e54 in gf_isom_open_file isomedia/isom_intern.c:979
#3 0x7fcb9e853b77 in gf_isom_open isomedia/isom_read.c:520
#4 0x55e0f156ddb7 in mp4boxMain /home/kali/temp/gpac/applications/mp4box/main.c:5970
#5 0x55e0f15704dc in main /home/kali/temp/gpac/applications/mp4box/main.c:6587
#6 0x7fcb9e3fb7ec in __libc_start_main ../csu/libc-start.c:332
#7 0x55e0f155bab9 in _start (/home/kali/temp/gpac/bin/gcc/MP4Box+0x16ab9)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV isomedia/isom_intern.c:392 in gf_isom_parse_movie_boxes_internal
==19277==ABORTING
```
**Analysis**
```bash
────────────────────────────────────────────────────────────────────────[ REGISTERS ]────────────────────────────────────────────────────────────────────────
RAX 0x0
RBX 0x5555555a5c90 (__libc_csu_init) ◂— push r15
RCX 0xc00
RDX 0x0
RIP 0x7ffff78639cd (gf_isom_parse_movie_boxes_internal+653) ◂— mov eax, dword ptr [rax]
─────────────────────────────────────────────────────────────────────────[ DISASM ]──────────────────────────────────────────────────────────────────────────
► 0x7ffff78639cd <gf_isom_parse_movie_boxes_internal+653> mov eax, dword ptr [rax]
0x7ffff78639cf <gf_isom_parse_movie_boxes_internal+655> cmp eax, 0x73747970
0x7ffff78639d4 <gf_isom_parse_movie_boxes_internal+660> je gf_isom_parse_movie_boxes_internal+3452 <gf_isom_parse_movie_boxes_internal+3452>
──────────────────────────────────────────────────────────────────────[ SOURCE (CODE) ]──────────────────────────────────────────────────────────────────────
In file: /root/fuzzing/gpac/src/isomedia/isom_intern.c
387 return e;
388 } else {
389 return e;
390 }
391
► 392 switch (a->type) {
393 /*MOOV box*/
394 case GF_ISOM_BOX_TYPE_MOOV:
395 if (mov->moov) {
396 GF_LOG(GF_LOG_ERROR, GF_LOG_CONTAINER, ("[iso file] Duplicate MOOV detected!\n"));
397 gf_isom_box_del(a);
```
It tries to read the `type` member from `a` struct while `a` struct is equall `NULL`.
**Backtrace**
```bash
pwndbg> bt
#0 0x00007ffff78639cd in gf_isom_parse_movie_boxes_internal (mov=0x5555555cd2a0, boxType=0x0, bytesMissing=0x7fffffffa6c8, progressive_mode=GF_FALSE) at isomedia/isom_intern.c:392
#1 0x00007ffff7865407 in gf_isom_parse_movie_boxes (mov=0x5555555cd2a0, boxType=0x0, bytesMissing=0x7fffffffa6c8, progressive_mode=GF_FALSE) at isomedia/isom_intern.c:859
#2 0x00007ffff7865786 in gf_isom_open_file (fileName=0x7fffffffe408 "./gpac_fuzzing/afl_out/master/crashes/id:000000,sig:11,src:000568,time:4829100,execs:923919,op:havoc,rep:4", OpenMode=GF_ISOM_OPEN_EDIT, tmp_dir=0x0) at isomedia/isom_intern.c:979
#3 0x00007ffff78684a9 in gf_isom_open (fileName=0x7fffffffe408 "./gpac_fuzzing/afl_out/master/crashes/id:000000,sig:11,src:000568,time:4829100,execs:923919,op:havoc,rep:4", OpenMode=GF_ISOM_OPEN_EDIT, tmp_dir=0x0) at isomedia/isom_read.c:520
#4 0x000055555557cdb8 in mp4boxMain (argc=3, argv=0x7fffffffe0a8) at main.c:5970
#5 0x000055555557f4dd in main (argc=3, argv=0x7fffffffe0a8) at main.c:6587
#6 0x00007ffff73e47fd in __libc_start_main (main=0x55555557f4bd <main>, argc=3, argv=0x7fffffffe0a8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe098) at ../csu/libc-start.c:332
#7 0x000055555556aaba in _start ()
```
**Mitigation**
Check if `a` struct is not equall to `NULL` before the switch statment.
| NULL Pointer Dereference in gf_isom_parse_movie_boxes_internal | https://api.github.com/repos/gpac/gpac/issues/2155/comments | 0 | 2022-03-28T22:20:02Z | 2022-03-29T15:07:21Z | https://github.com/gpac/gpac/issues/2155 | 1,184,058,973 | 2,155 |
[
"gpac",
"gpac"
] |
poc-clean.svg available [here](https://drive.google.com/file/d/1Sw17h45RhIcfhEQKRj5A5MwPhYWNuo2p/view?usp=sharing)
```
Description
Attempting to parse a XML/SVG file containing an <!ENTITY with a sufficiently long name into a fixed sized, stack allocated buffer causes an overflow.
Proof of Concept
./bin/gcc/gpac -play ./poc-clean.svg
GDB
*** stack smashing detected ***: terminated
Thread 1 "gpac" received signal SIGABRT, Aborted.
0x00007ffff74b934c in __pthread_kill_implementation () from /usr/lib/libc.so.6
(gdb) bt
#0 0x00007ffff74b934c in __pthread_kill_implementation () at /usr/lib/libc.so.6
#1 0x00007ffff746c4b8 in raise () at /usr/lib/libc.so.6
#2 0x00007ffff7456534 in abort () at /usr/lib/libc.so.6
#3 0x00007ffff74ad397 in __libc_message () at /usr/lib/libc.so.6
#4 0x00007ffff754c2fa in __fortify_fail () at /usr/lib/libc.so.6
#5 0x00007ffff754c2c6 in () at /usr/lib/libc.so.6
#6 0x00007ffff7754f5a in () at /gpac/bin/gcc/libgpac.so.11
#7 0x00007ffff77550e8 in xml_sax_parse () at /gpac/bin/gcc/libgpac.so.11
#8 0x00007ffff775658b in xml_sax_read_file.part () at /gpac/bin/gcc/libgpac.so.11
#9 0x00007ffff7756876 in gf_xml_sax_parse_file () at /gpac/bin/gcc/libgpac.so.11
#10 0x00007ffff79ea5f6 in load_svg_run () at /gpac/bin/gcc/libgpac.so.11
#11 0x00007ffff7c20471 in svgin_process () at /gpac/bin/gcc/libgpac.so.11
#12 0x00007ffff7b4f8c5 in gf_filter_process_task () at /gpac/bin/gcc/libgpac.so.11
#13 0x00007ffff7b3cdc7 in gf_fs_thread_proc () at /gpac/bin/gcc/libgpac.so.11
#14 0x00007ffff7b41d7b in gf_fs_run () at /gpac/bin/gcc/libgpac.so.11
#15 0x0000555555563194 in gpac_main ()
#16 0x00007ffff7457310 in __libc_start_call_main () at /usr/lib/libc.so.6
#17 0x00007ffff74573c1 in __libc_start_main_impl () at /usr/lib/libc.so.6
#18 0x0000555555559dc5 in _start ()
Occurrences
xml_parser.c L688
No length check on this write to the fixed size array "szName" can go out of bounds with a sufficiently long entity name
``` | Stack buffer overflow in XML entity parsing | https://api.github.com/repos/gpac/gpac/issues/2154/comments | 0 | 2022-03-28T18:49:44Z | 2022-03-29T15:07:20Z | https://github.com/gpac/gpac/issues/2154 | 1,183,848,264 | 2,154 |
[
"gpac",
"gpac"
] | https://drive.google.com/file/d/1BQ49f00OCCs-eYouEcr_xOybrq7pkMol/view?usp=sharing
```
Proof of Concept
version
./bin/gcc/MP4Box -version
MP4Box - GPAC version 2.1-DEV-rev65-g718843df4-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-debug
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
Command: ./bin/gcc/MP4Box -xmt [poc](https://drive.google.com/file/d/1BQ49f00OCCs-eYouEcr_xOybrq7pkMol/view?usp=sharing)
Result: Segmentation fault
poc
bt:
Starting program: /home/ubuntu/fuzz/gpac/bin/gcc/MP4Box -xmt ./poc
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
[iso file] Unknown box type url@ in parent dref
[iso file] Unknown box type mp1Dv in parent stsd
[iso file] extra box maxr found in hinf, deleting
[iso file] Unknown box type t0E18 in parent trak
[iso file] extra box maxr found in hinf, deleting
[iso file] Unknown box type 80rak in parent moov
[iso file] Incomplete box mdat - start 11495 size 803701
[iso file] Incomplete file while reading for dump - aborting parsing
[iso file] Unknown box type url@ in parent dref
[iso file] Unknown box type mp1Dv in parent stsd
[iso file] extra box maxr found in hinf, deleting
[iso file] Unknown box type t0E18 in parent trak
[iso file] extra box maxr found in hinf, deleting
[iso file] Unknown box type 80rak in parent moov
[iso file] Incomplete box mdat - start 11495 size 803701
[iso file] Incomplete file while reading for dump - aborting parsing
MPEG-4 BIFS Scene Parsing
[ODF] Reading bifs config: shift in sizes (not supported)
Program received signal SIGSEGV, Segmentation fault.
0x00007ffff7240bc7 in BS_ReadByte (bs=0x5555557d29b0) at utils/bitstream.c:362
362 res = bs->original[bs->position++];
LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA
───────────────────────────────────────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────────────────────────────────────────
RAX 0x0
RBX 0x0
RCX 0x1
RDX 0x5555557d29b0 ◂— 0x0
RDI 0x5555557d29b0 ◂— 0x0
RSI 0x0
R8 0x0
R9 0x0
R10 0x9
R11 0x7ffff72aa158 (gf_node_get_graph) ◂— push rbp
R12 0x5555557d4890 —▸ 0x5555557d4460 ◂— 0x0
R13 0x5555557d4460 ◂— 0x0
R14 0x1
R15 0x0
RBP 0x7fffffff8730 —▸ 0x7fffffff8760 —▸ 0x7fffffff8790 —▸ 0x7fffffff87e0 —▸ 0x7fffffff8850 ◂— ...
RSP 0x7fffffff8700 ◂— 0x0
RIP 0x7ffff7240bc7 (BS_ReadByte+166) ◂— movzx eax, byte ptr [rax]
────────────────────────────────────────────────────────────────────────────────[ DISASM ]─────────────────────────────────────────────────────────────────────────────────
► 0x7ffff7240bc7 <BS_ReadByte+166> movzx eax, byte ptr [rax]
0x7ffff7240bca <BS_ReadByte+169> mov byte ptr [rbp - 0x13], al
0x7ffff7240bcd <BS_ReadByte+172> mov rax, qword ptr [rbp - 0x28]
0x7ffff7240bd1 <BS_ReadByte+176> mov eax, dword ptr [rax + 0x50]
0x7ffff7240bd4 <BS_ReadByte+179> test eax, eax
0x7ffff7240bd6 <BS_ReadByte+181> je BS_ReadByte+336 <BS_ReadByte+336>
↓
0x7ffff7240c71 <BS_ReadByte+336> movzx eax, byte ptr [rbp - 0x13]
0x7ffff7240c75 <BS_ReadByte+340> jmp BS_ReadByte+896 <BS_ReadByte+896>
↓
0x7ffff7240ea1 <BS_ReadByte+896> mov rcx, qword ptr [rbp - 8]
0x7ffff7240ea5 <BS_ReadByte+900> xor rcx, qword ptr fs:[0x28]
0x7ffff7240eae <BS_ReadByte+909> je BS_ReadByte+916 <BS_ReadByte+916>
─────────────────────────────────────────────────────────────────────────────[ SOURCE (CODE) ]─────────────────────────────────────────────────────────────────────────────
In file: /home/ubuntu/fuzz/gpac/src/utils/bitstream.c
357 if (bs->position >= bs->size) {
358 if (bs->EndOfStream) bs->EndOfStream(bs->par);
359 if (!bs->overflow_state) bs->overflow_state = 1;
360 return 0;
361 }
► 362 res = bs->original[bs->position++];
363
364 if (bs->remove_emul_prevention_byte) {
365 if ((bs->nb_zeros==2) && (res==0x03) && (bs->position<bs->size) && (bs->original[bs->position]<0x04)) {
366 bs->nb_zeros = 0;
367 res = bs->original[bs->position++];
─────────────────────────────────────────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────────────────────────────────────────
00:0000│ rsp 0x7fffffff8700 ◂— 0x0
01:0008│ 0x7fffffff8708 —▸ 0x5555557d29b0 ◂— 0x0
02:0010│ 0x7fffffff8710 ◂— 0x0
... ↓ 2 skipped
05:0028│ 0x7fffffff8728 ◂— 0xe537f499f4c1e900
06:0030│ rbp 0x7fffffff8730 —▸ 0x7fffffff8760 —▸ 0x7fffffff8790 —▸ 0x7fffffff87e0 —▸ 0x7fffffff8850 ◂— ...
07:0038│ 0x7fffffff8738 —▸ 0x7ffff7240edb (gf_bs_read_bit+36) ◂— movzx edx, al
───────────────────────────────────────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────────────────────────────────────────
► f 0 0x7ffff7240bc7 BS_ReadByte+166
f 1 0x7ffff7240edb gf_bs_read_bit+36
f 2 0x7ffff7240f67 gf_bs_read_int+64
f 3 0x7ffff73d9f47 BM_ParseCommand+87
f 4 0x7ffff73da181 gf_bifs_flush_command_list+296
f 5 0x7ffff73da561 gf_bifs_decode_command_list+339
f 6 0x7ffff75c1189 gf_sm_load_run_isom+1987
f 7 0x7ffff75a3123 gf_sm_load_run+42
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
pwndbg> where
#0 0x00007ffff7240bc7 in BS_ReadByte (bs=0x5555557d29b0) at utils/bitstream.c:362
#1 0x00007ffff7240edb in gf_bs_read_bit (bs=0x5555557d29b0) at utils/bitstream.c:428
#2 0x00007ffff7240f67 in gf_bs_read_int (bs=0x5555557d29b0, nBits=1) at utils/bitstream.c:461
#3 0x00007ffff73d9f47 in BM_ParseCommand (codec=0x5555557def00, bs=0x5555557d29b0, com_list=0x5555557f3960) at bifs/memory_decoder.c:898
#4 0x00007ffff73da181 in gf_bifs_flush_command_list (codec=0x5555557def00) at bifs/memory_decoder.c:956
#5 0x00007ffff73da561 in gf_bifs_decode_command_list (codec=0x5555557def00, ESID=8, data=0x5555557df340 '\314' <repeats 102 times>, "̔\224\224\224\224\224\224\224", <incomplete sequence \341>, data_length=8208, com_list=0x5555557df2c0) at bifs/memory_decoder.c:1036
#6 0x00007ffff75c1189 in gf_sm_load_run_isom (load=0x7fffffff89c0) at scene_manager/loader_isom.c:303
#7 0x00007ffff75a3123 in gf_sm_load_run (load=0x7fffffff89c0) at scene_manager/scene_manager.c:719
#8 0x0000555555582280 in dump_isom_scene ()
#9 0x00005555555789de in mp4boxMain ()
#10 0x00007ffff6dcdbf7 in __libc_start_main (main=0x55555556c140 <main>, argc=3, argv=0x7fffffffe458, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe448) at ../csu/libc-start.c:310
#11 0x000055555556c17a in _start ()
After Debugging,I found
src/bifs/memory_decoder.c:953
GF_Err gf_bifs_flush_command_list(GF_BifsDecoder *codec)
if (cbi->cb->bufferSize) {
bs = gf_bs_new((char*)cbi->cb->buffer, cbi->cb->bufferSize, GF_BITSTREAM_READ);
gf_bs_set_eos_callback(bs, BM_EndOfStream, codec);
e = BM_ParseCommand(codec, bs, cbi->cb->commandList);
gf_bs_del(bs);
}
after called gf_bs_new, sets bs->origin to null
then using BM_ParseCommand function
src/bifs/memory_decoder.c:887
GF_Err BM_ParseCommand(GF_BifsDecoder *codec, GF_BitStream *bs, GF_List *com_list)
{
u8 go, type;
GF_Err e;
go = 1;
e = GF_OK;
GF_SceneGraph *cur_graph = codec->current_graph;
GF_Proto *cur_proto = codec->pCurrentProto;
codec->LastError = GF_OK;
while (go) {
type = gf_bs_read_int(bs, 2);
switch (type) {
case 0:
e = BM_ParseInsert(codec, bs, com_list);
break;
case 1:
e = BM_ParseDelete(codec, bs, com_list);
break;
case 2:
e = BM_ParseReplace(codec, bs, com_list);
break;
case 3:
e = BM_SceneReplace(codec, bs, com_list);
break;
}
if (e) break;
go = gf_bs_read_int(bs, 1);
}
while (gf_list_count(codec->QPs)) {
gf_bifs_dec_qp_remove(codec, GF_TRUE);
}
codec->current_graph = cur_graph;
codec->pCurrentProto = cur_proto;
return e;
}
in type = gf_bs_read_int(bs, 2);
src/utils/bitstream.c
GF_EXPORT
u32 gf_bs_read_int(GF_BitStream *bs, u32 nBits)
{
u32 ret;
bs->total_bits_read+= nBits;
#ifndef NO_OPTS
if (nBits + bs->nbBits <= 8) {
bs->nbBits += nBits;
ret = (bs->current >> (8 - bs->nbBits) ) & bits_mask[nBits];
return ret;
}
#endif
ret = 0;
while (nBits-- > 0) {
ret <<= 1;
ret |= gf_bs_read_bit(bs);
}
return ret;
}
In gf_bs_read_bit using BS_ReadByte function
GF_EXPORT
u8 gf_bs_read_bit(GF_BitStream *bs)
{
if (bs->nbBits == 8) {
bs->current = BS_ReadByte(bs);
bs->nbBits = 0;
}
#ifdef NO_OPTS
{
s32 ret;
bs->current <<= 1;
bs->nbBits++;
ret = (bs->current & 0x100) >> 8;
return (u8) ret;
}
#else
return (u8) (bs->current & bit_mask[bs->nbBits++]) ? 1 : 0;
#endif
}
In src/utils/bitstream.c BS_ReadByte
/*fetch a new byte in the bitstream switch between packets*/
static u8 BS_ReadByte(GF_BitStream *bs)
{
Bool is_eos;
if (bs->bsmode == GF_BITSTREAM_READ) {
u8 res;
if (bs->position >= bs->size) {
if (bs->EndOfStream) bs->EndOfStream(bs->par);
if (!bs->overflow_state) bs->overflow_state = 1;
return 0;
}
res = bs->original[bs->position++];
if (bs->remove_emul_prevention_byte) {
if ((bs->nb_zeros==2) && (res==0x03) && (bs->position<bs->size) && (bs->original[bs->position]<0x04)) {
bs->nb_zeros = 0;
res = bs->original[bs->position++];
}
if (!res) bs->nb_zeros++;
else bs->nb_zeros = 0;
}
return res;
}
if (bs->cache_write)
bs_flush_write_cache(bs);
is_eos = gf_feof(bs->stream);
/*we are in FILE mode, test for end of file*/
if (!is_eos || bs->cache_read) {
u8 res;
Bool loc_eos=GF_FALSE;
assert(bs->position<=bs->size);
bs->position++;
res = gf_bs_load_byte(bs, &loc_eos);
if (loc_eos) goto bs_eof;
if (bs->remove_emul_prevention_byte) {
if ((bs->nb_zeros==2) && (res==0x03) && (bs->position<bs->size)) {
u8 next = gf_bs_load_byte(bs, &loc_eos);
if (next < 0x04) {
bs->nb_zeros = 0;
res = next;
bs->position++;
} else {
gf_bs_seek(bs, bs->position);
}
}
if (!res) bs->nb_zeros++;
else bs->nb_zeros = 0;
}
return res;
}
bs_eof:
if (bs->EndOfStream) {
bs->EndOfStream(bs->par);
if (!bs->overflow_state) bs->overflow_state = 1;
} else {
GF_LOG(GF_LOG_ERROR, GF_LOG_CORE, ("[BS] Attempt to overread bitstream\n"));
}
assert(bs->position <= 1+bs->size);
return 0;
}
res = bs->original[bs->position++]; Here using bs->original which is a null pointer, dereference this null pointer caused segmentation fault
it's very similar to https://huntr.dev/bounties/851942a4-1d64-4553-8fdc-9fccd167864b/
Occurrences
bitstream.c L126
``` | Null Pointer Dereference Caused Segmentation Fault | https://api.github.com/repos/gpac/gpac/issues/2153/comments | 0 | 2022-03-27T16:11:27Z | 2022-03-29T15:07:20Z | https://github.com/gpac/gpac/issues/2153 | 1,182,580,518 | 2,153 |
[
"gpac",
"gpac"
] | **Description**
I'm using GPAC to recreate DASH mpd's and HLS playlists. That's to simulate an event from a static asset, or creating a new playlist from 2 individual static assets.
```
gpac --forward=segb -i asset/manifest.mpd -i asset2/manifest.mpd -o merged.mpd:sigfrag:dual
```
```
gpac --forward=segb -i asset/manifest.mpd reframer:rt=on @ -o live.mpd:sigfrag:dynamic:tsb=-1:dual
```
**Expected**
The HLS playlist also contains the directory in the list of individual fragments.
**Actual**
In both cases the resulting HLS playlist for the chunks doesn't contain the `asset` or `asset2` prefix for the individual fragments. It does contain it for the init fragment however.
**Environment**
- macOS Monterey 12.3
- GPAC version 2.0-rev0-g418db414-master | Missing directory in HLS playlist generated from existing MPD | https://api.github.com/repos/gpac/gpac/issues/2152/comments | 2 | 2022-03-24T09:41:09Z | 2022-04-06T07:34:52Z | https://github.com/gpac/gpac/issues/2152 | 1,179,253,803 | 2,152 |
[
"gpac",
"gpac"
] | I'm trying to use MP4Box to tag some AAC audio files (using the **-itags option**) and I'm getting an unexpected error when trying to add these two tags:
- record_company (A9mak)
- publisher (A9pub)
MP4Box reports an error for them as:
`[iso file] Unknown box type A9mak` respectively
`[iso file] Unknown box type A9pub`
Dumping the tags with MP4Box -disox shows that the tags are added in the file, but with a **Container=unknown** and the value as **data:application/octet-string** (vs expected text).
Here's how the metadata read back **is shown**:
`<UnknownBox Size="35" Type="A9mak" Specification="unknown" Container="unknown" value="data:application/octet-string,41396D616B2D544553540D" >`
`<data Size="27" Type="data" Version="0" Flags="1" Specification="apple" Container="ilst *" >`
`</data></UnknownBox>`
And here's what I **expected**:
`<record_company Size="10" Type="A9mak" Specification="apple" Container="ilst data" value="A9mak-TEST" >`
`<data Size="26" Type="data" Version="0" Flags="1" Specification="apple" Container="ilst *" >`
`</data></record_company>`
The tags are set per MP4Box documentation: https://github.com/gpac/gpac/wiki/mp4box-other-opts#tagging-support
Here's **how to repro** (files available at: https://www.dropbox.com/sh/tnmhfy5cx2apxju/AABVZV1ssiGWwA9_42p8H-Pta):
`copy /y Test-ORIG.m4a Test.m4a`
`mp4box.exe -itags mp4_metadata-full-set.txt Test.m4a`
`mp4box.exe -disox Test.m4a -std > Test.m4a.xml`
The error is **not file dependent** (I've seen it reproduced on all files I tried) and it's **reproducible on latest GPAC** (MP4Box - GPAC version 2.1-DEV-rev74-gfa127347-master).
I am not able to find any other reports of such errors.
I have done a test with all the tagging elements that are supported by MP4Box and discovered there are a few more that exhibit the same issue. Here's the full list of tags that fail:
- Unknown box type A9ard
- Unknown box type A9arg
- Unknown box type A9aut
- Unknown box type A9cak
- Unknown box type A9des
- Unknown box type A9dir
- Unknown box type A9equ
- Unknown box type A9lnt
- Unknown box type A9mak
- Unknown box type A9ope
- Unknown box type A9phg
- Unknown box type A9prd
- Unknown box type A9prf
- Unknown box type A9pub
- Unknown box type A9sne
- Unknown box type A9sol
- Unknown box type A9src
- Unknown box type A9thx
- Unknown box type A9url
- Unknown box type A9xpd
**Environment:**
* Windows64
* GPAC version - latest nightly build: version 2.1-DEV-rev74-gfa127347-master | Tagging of AAC files with MP4Box -itags fails for record_company (A9mak), publisher (A9pub) and a few other tags | https://api.github.com/repos/gpac/gpac/issues/2151/comments | 1 | 2022-03-23T01:00:50Z | 2022-03-30T09:00:32Z | https://github.com/gpac/gpac/issues/2151 | 1,177,463,487 | 2,151 |
[
"gpac",
"gpac"
] | I want to add/cat file with this command: `-add /mnt/sdcard/newtarget3.mp4 /mnt/sdcard/media.mp4` using mp4box android.
Then i get the following output: `[31mCannot open destination file /mnt/sdcard/media.mp4: I/O Error`
`[0m`
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x ] I looked for a similar issue and couldn't find any.
- [x ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [ x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
| MP4Box Android: I/O Error | https://api.github.com/repos/gpac/gpac/issues/2150/comments | 1 | 2022-03-22T04:58:43Z | 2022-05-18T16:32:15Z | https://github.com/gpac/gpac/issues/2150 | 1,176,267,335 | 2,150 |
[
"gpac",
"gpac"
] | [poc.zip](https://github.com/gpac/gpac/files/8311643/poc.zip)
```
Description
Null Pointer Dereference in gpac
Proof of Concept
Version:
~/fuzzing/gpac/gpac/bin/gcc/MP4Box -version
MP4Box - GPAC version 2.1-DEV-rev15-g6c0f4ff03-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration:
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
System information Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz
command:
./MP4Box -info poc
Result
~/fuzzing/gpac/gpac/bin/gcc/MP4Box -info ./poc
[Core] exp-golomb read failed, not enough bits in bitstream !
[HEVC] Warning: Error parsing NAL unit
AddressSanitizer:DEADLYSIGNAL
=================================================================
==1172475==ERROR: AddressSanitizer: SEGV on unknown address 0x00010000000d (pc 0x7f031b4ec838 bp 0x000000000002 sp 0x7ffca1f029b8 T0)
==1172475==The signal is caused by a READ memory access.
#0 0x7f031b4ec837 (/lib/x86_64-linux-gnu/libasan.so.5+0x12e837)
#1 0x7f031b4ec9d1 (/lib/x86_64-linux-gnu/libasan.so.5+0x12e9d1)
#2 0x7f031b4ec60b (/lib/x86_64-linux-gnu/libasan.so.5+0x12e60b)
#3 0x7f031b3ea141 (/lib/x86_64-linux-gnu/libasan.so.5+0x2c141)
#4 0x7f031b3e6e1f (/lib/x86_64-linux-gnu/libasan.so.5+0x28e1f)
#5 0x7f031b4cc0b1 in __interceptor_realloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10e0b1)
#6 0x7f031abc5655 in gf_list_add (/home/aidai/fuzzing/gpac/gpac/bin/gcc/libgpac.so.11+0xac655)
#7 0x7f031b0ca909 in naludmx_process (/home/aidai/fuzzing/gpac/gpac/bin/gcc/libgpac.so.11+0x5b1909)
#8 0x7f031afa67ef in gf_filter_process_task (/home/aidai/fuzzing/gpac/gpac/bin/gcc/libgpac.so.11+0x48d7ef)
#9 0x7f031af944d3 in gf_fs_thread_proc (/home/aidai/fuzzing/gpac/gpac/bin/gcc/libgpac.so.11+0x47b4d3)
#10 0x7f031af9943a in gf_fs_run (/home/aidai/fuzzing/gpac/gpac/bin/gcc/libgpac.so.11+0x48043a)
#11 0x7f031ae07151 in gf_media_import (/home/aidai/fuzzing/gpac/gpac/bin/gcc/libgpac.so.11+0x2ee151)
#12 0x5613ea17fdc2 in convert_file_info (/home/aidai/fuzzing/gpac/gpac/bin/gcc/MP4Box+0x3ddc2)
#13 0x5613ea16e6d2 in mp4boxMain (/home/aidai/fuzzing/gpac/gpac/bin/gcc/MP4Box+0x2c6d2)
#14 0x7f031a94b0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x240b2)
#15 0x5613ea15b53d in _start (/home/aidai/fuzzing/gpac/gpac/bin/gcc/MP4Box+0x1953d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libasan.so.5+0x12e837)
==1172475==ABORTING
Occurrences
list.c L99
``` | Untrusted Pointer Dereference | https://api.github.com/repos/gpac/gpac/issues/2149/comments | 0 | 2022-03-20T16:24:25Z | 2022-03-21T10:52:11Z | https://github.com/gpac/gpac/issues/2149 | 1,174,603,686 | 2,149 |
[
"gpac",
"gpac"
] | MP4Box.exe has an `pssh=m` option to write PSSH atom only in a manifest `<cenc:pssh>xxx</cenc:pssh>` element. Is it possible to omit PSSH from both init.mp4 and manifest, maybe `pssh=none` option?
Additionally is it possible to remove `PSSH` atom from the existing init.mp4 file? At the moment I am using a java application using mp4parser.jar library to drop pssh atom.
https://github.com/gpac/gpac/blob/f6d6225a91488d9f43f10ebc5494ae8ef4d95ece/applications/mp4box/main.c#L590
| Omit PSSH from init.mp4 and manifest.mpd? | https://api.github.com/repos/gpac/gpac/issues/2148/comments | 2 | 2022-03-17T08:28:54Z | 2022-03-22T15:27:21Z | https://github.com/gpac/gpac/issues/2148 | 1,172,074,711 | 2,148 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [ ] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
| Is there a player to playback a live.mpd session for Unreal Engine? | https://api.github.com/repos/gpac/gpac/issues/2147/comments | 2 | 2022-03-17T05:54:16Z | 2022-03-21T15:55:33Z | https://github.com/gpac/gpac/issues/2147 | 1,171,963,013 | 2,147 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
Version:
```
MP4Box -version
MP4Box - GPAC version 2.1-DEV-rev48-gf6d6225a9-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/
MINI build (encoders, decoders, audio and video output disabled)
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --static-bin
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_OPENSVC GPAC_DISABLE_3D
```
Command:
`MP4Box -lsr poc1`
[poc1.zip](https://github.com/gpac/gpac/files/8274174/poc1.zip)
Result:
`Segmentation fault`
bt:
```
[iso file] Unknown box type FF00ak in parent moov
[iso file] Unknown box type t0E18 in parent trak
[iso file] extra box maxr found in hinf, deleting
[iso file] Unknown box type 80rak in parent moov
[iso file] Incomplete box mdat - start 11495 size 803729
[iso file] Incomplete file while reading for dump - aborting parsing
[iso file] Unknown box type FF00ak in parent moov
[iso file] Unknown box type t0E18 in parent trak
[iso file] extra box maxr found in hinf, deleting
[iso file] Unknown box type 80rak in parent moov
[iso file] Incomplete box mdat - start 11495 size 803729
[iso file] Incomplete file while reading for dump - aborting parsing
MPEG-4 BIFS Scene Parsing
[ODF] Reading bifs config: shift in sizes (not supported)
[BIFS] Node Group not allowed as field/child of NDT type 37
Scene loaded - dumping 1 systems streams
Program received signal SIGSEGV, Segmentation fault.
gf_dump_vrml_simple_field (sdump=sdump@entry=0x5555558873e0, parent=<optimized out>, field=...) at scene_manager/scene_dump.c:759
759 gf_dump_vrml_node(sdump, *(GF_Node **)field.far_ptr, 0, NULL);
0x00007ffff71d1e1a <+346>: add %rbp,%r8
0x00007ffff71d1e1d <+349>: movzbl (%r8),%eax
0x00007ffff71d1e21 <+353>: add $0x1,%al
0x00007ffff71d1e23 <+355>: jb 0x7ffff71d23b5 <gf_dump_vrml_simple_field+1781>
0x00007ffff71d1e29 <+361>: add %r14d,%eax
0x00007ffff71d1e2c <+364>: xor %ecx,%ecx
0x00007ffff71d1e2e <+366>: xor %edx,%edx
0x00007ffff71d1e30 <+368>: mov %r12,%rdi
0x00007ffff71d1e33 <+371>: mov %al,(%r8)
0x00007ffff71d1e36 <+374>: movl $0x516d,%fs:(%rbx)
=> 0x00007ffff71d1e3d <+381>: mov 0x0(%r13),%rsi
0x00007ffff71d1e41 <+385>: callq 0x7ffff71cd170 <gf_dump_vrml_node>
0x00007ffff71d1e46 <+390>: mov %fs:(%rbx),%r8d
0x00007ffff71d1e4a <+394>: xor $0x2a76,%r8d
0x00007ffff71d1e51 <+401>: add %rbp,%r8
0x00007ffff71d1e54 <+404>: xor %r12d,%r12d
0x00007ffff71d1e57 <+407>: movzbl (%r8),%ebp
0x00007ffff71d1e5b <+411>: add $0x1,%bpl
0x00007ffff71d1e5f <+415>: jb 0x7ffff71d237f <gf_dump_vrml_simple_field+1727>
0x00007ffff71d1e65 <+421>: add %r12d,%ebp
0x00007ffff71d1e68 <+424>: mov %bpl,(%r8)
Stack level 0, frame at 0x7fffffff6f30:
rip = 0x7ffff71d1e3d in gf_dump_vrml_simple_field (scene_manager/scene_dump.c:759); saved rip = 0x7ffff71d27aa
called by frame at 0x7fffffff6fc0
source language c.
Arglist at 0x7fffffff6eb8, args: sdump=sdump@entry=0x5555558873e0, parent=<optimized out>, field=...
Locals at 0x7fffffff6eb8, Previous frame's sp is 0x7fffffff6f30
Saved registers:
rbx at 0x7fffffff6ef8, rbp at 0x7fffffff6f00, r12 at 0x7fffffff6f08, r13 at 0x7fffffff6f10, r14 at 0x7fffffff6f18, r15 at 0x7fffffff6f20, rip at 0x7fffffff6f28
(gdb) where
#0 gf_dump_vrml_simple_field (sdump=sdump@entry=0x5555558873e0, parent=<optimized out>, field=...) at scene_manager/scene_dump.c:759
#1 0x00007ffff71d27aa in DumpMultipleIndexedReplace (sdump=sdump@entry=0x5555558873e0, com=<optimized out>, com=<optimized out>) at scene_manager/scene_dump.c:1731
#2 0x00007ffff71c7ace in gf_sm_dump_command_list
(sdump=sdump@entry=0x5555558873e0, comList=<optimized out>, indent=indent@entry=1, skip_first_replace=skip_first_replace@entry=GF_TRUE) at scene_manager/scene_dump.c:2958
#3 0x00007ffff71db286 in gf_sm_dump
(ctx=ctx@entry=0x55555587e660, rad_name=rad_name@entry=0x555555832de0 <outfile> "poc1", is_final_name=is_final_name@entry=GF_FALSE, dump_mode=dump_mode@entry=GF_SM_DUMP_LASER) at scene_manager/scene_dump.c:3575
#4 0x00005555555b9e20 in dump_isom_scene
(file=<optimized out>, inName=<optimized out>, is_final_name=<optimized out>, dump_mode=<optimized out>, do_log=<optimized out>, no_odf_conv=<optimized out>)
at filedump.c:217
#5 0x000055555559ae41 in mp4boxMain (argc=<optimized out>, argv=<optimized out>) at main.c:6146
#6 0x00007ffff65d60b3 in __libc_start_main (main=
0x55555556e920 <main>, argc=3, argv=0x7fffffffe068, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe058)
at ../csu/libc-start.c:308
#7 0x000055555556eb2e in _start () at main.c:6601
```
| Possible Bug - Segmentation fault found | https://api.github.com/repos/gpac/gpac/issues/2146/comments | 2 | 2022-03-17T00:24:19Z | 2022-07-31T22:03:05Z | https://github.com/gpac/gpac/issues/2146 | 1,171,725,165 | 2,146 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
## description
Hello, I was fuzzing a old version gpac (v0.7.1) and found some bugs that seems not been fixed yet.
Although the pocs cannot produce the error in the latest version, I didn't found any issue corresponding to these bugs and the buggy code location looks similar in the latest version. **I check corresponding code location and search issues manually and didn't find anything.**
So I think maybe these pocs are just blocked by the format check and could be triggered if the file format are fixed. Unfortunately now I'm working on a fuzzing paper and cannot provide a poc for the latest version.
If you have time, Could you help check if these bugs still exists in the latest version? Thanks.
## steps to compile
```
git checkout v0.7.1
./configure --cc=clang --cxx=clang++ --enable-sanitizer
make -j$(nproc)
./bin/gcc/MP4Box -diso POC
```
## POC1
```
[iso file] extra box hdlr found in mdia, deleting
=================================================================
==2022024==ERROR: AddressSanitizer: requested allocation size 0xfffffffffffffffc (0x800 after adjustments for alignment, red zones etc.) exceeds maximum supported size of 0x10000000000 (thread T0)
#0 0x49f09d in __interceptor_malloc (/benchmarks/gpac/bin/gcc/MP4Box+0x49f09d)
#1 0xd7daca in stri_Read /benchmarks/gpac/src/isomedia/box_code_base.c:7144:2
#2 0x7b9b30 in gf_isom_box_array_read_ex /benchmarks/gpac/src/isomedia/box_funcs.c:1217:7
#3 0xd61449 in minf_Read /benchmarks/gpac/src/isomedia/box_code_base.c:3503:6
#4 0x7b9b30 in gf_isom_box_array_read_ex /benchmarks/gpac/src/isomedia/box_funcs.c:1217:7
#5 0xd5decf in mdia_Read /benchmarks/gpac/src/isomedia/box_code_base.c:3028:13
#6 0x7b9b30 in gf_isom_box_array_read_ex /benchmarks/gpac/src/isomedia/box_funcs.c:1217:7
#7 0xd7aece in trak_Read /benchmarks/gpac/src/isomedia/box_code_base.c:7019:6
#8 0x7b8177 in gf_isom_box_read /benchmarks/gpac/src/isomedia/box_funcs.c:1323:9
#9 0x7b8177 in gf_isom_box_parse_ex /benchmarks/gpac/src/isomedia/box_funcs.c:196:15
#10 0x7b9b30 in gf_isom_box_array_read_ex /benchmarks/gpac/src/isomedia/box_funcs.c:1217:7
#11 0xd6318f in moov_Read /benchmarks/gpac/src/isomedia/box_code_base.c:3748:6
#12 0x7b73b3 in gf_isom_parse_root_box /benchmarks/gpac/src/isomedia/box_funcs.c:42:8
==2022024==HINT: if you don't care about these errors you may set allocator_may_return_null=1
SUMMARY: AddressSanitizer: allocation-size-too-big (/benchmarks/gpac/bin/gcc/MP4Box+0x49f09d) in __interceptor_malloc
==2022024==ABORTING
```
## POC2
```
[iso file] extra box hdlr found in mdia, deleting
=================================================================
==2022024==ERROR: AddressSanitizer: requested allocation size 0xfffffffffffffffc (0x800 after adjustments for alignment, red zones etc.) exceeds maximum supported size of 0x10000000000 (thread T0)
#0 0x49f09d in __interceptor_malloc (/benchmarks/gpac/bin/gcc/MP4Box+0x49f09d)
#1 0xd7daca in stri_Read /benchmarks/gpac/src/isomedia/box_code_base.c:7144:2
#2 0x7b9b30 in gf_isom_box_array_read_ex /benchmarks/gpac/src/isomedia/box_funcs.c:1217:7
#3 0xd61449 in minf_Read /benchmarks/gpac/src/isomedia/box_code_base.c:3503:6
#4 0x7b9b30 in gf_isom_box_array_read_ex /benchmarks/gpac/src/isomedia/box_funcs.c:1217:7
#5 0xd5decf in mdia_Read /benchmarks/gpac/src/isomedia/box_code_base.c:3028:13
#6 0x7b9b30 in gf_isom_box_array_read_ex /benchmarks/gpac/src/isomedia/box_funcs.c:1217:7
#7 0xd7aece in trak_Read /benchmarks/gpac/src/isomedia/box_code_base.c:7019:6
#8 0x7b8177 in gf_isom_box_read /benchmarks/gpac/src/isomedia/box_funcs.c:1323:9
#9 0x7b8177 in gf_isom_box_parse_ex /benchmarks/gpac/src/isomedia/box_funcs.c:196:15
#10 0x7b9b30 in gf_isom_box_array_read_ex /benchmarks/gpac/src/isomedia/box_funcs.c:1217:7
#11 0xd6318f in moov_Read /benchmarks/gpac/src/isomedia/box_code_base.c:3748:6
#12 0x7b73b3 in gf_isom_parse_root_box /benchmarks/gpac/src/isomedia/box_funcs.c:42:8
==2022024==HINT: if you don't care about these errors you may set allocator_may_return_null=1
SUMMARY: AddressSanitizer: allocation-size-too-big (/benchmarks/gpac/bin/gcc/MP4Box+0x49f09d) in __interceptor_malloc
==2022024==ABORTING
root@d50bc8375ea4:/validate/run1/gpac# /benchmarks/gpac/bin/gcc/MP4Box -diso crash.1
[MPEG-2 TS] PID 2337 AF Location descriptor found - URL
[MPEG-2 TS] PID 2337 AF Location descriptor found - URL
[MPEG-2 TS] PID 2337: Bad Adaptation Descriptor found (tag 5) size is 5 but only 5 bytes available
=================================================================
==2022026==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffb9edac9c at pc 0x000000548e88 bp 0x7fffb9eda3e0 sp 0x7fffb9eda3d8
READ of size 1 at 0x7fffb9edac9c thread T0
#0 0x548e87 in BS_ReadByte /benchmarks/gpac/src/utils/bitstream.c:211:16
#1 0x548f6d in gf_bs_read_bit /benchmarks/gpac/src/utils/bitstream.c:241:17
#2 0x548f6d in gf_bs_read_int /benchmarks/gpac/src/utils/bitstream.c:273:10
#3 0xa5114f in gf_m2ts_get_adaptation_field /benchmarks/gpac/src/media_tools/mpegts.c:3201:19
#4 0xa3549f in gf_m2ts_process_packet /benchmarks/gpac/src/media_tools/mpegts.c:3308:16
#5 0xa3549f in gf_m2ts_process_data /benchmarks/gpac/src/media_tools/mpegts.c:3534:8
#6 0xa0606e in gf_import_mpeg_ts /benchmarks/gpac/src/media_tools/media_import.c:8899:3
#7 0xa1450e in gf_media_import /benchmarks/gpac/src/media_tools/media_import.c
#8 0x519dfa in convert_file_info /benchmarks/gpac/applications/mp4box/fileimport.c:123:6
#9 0x4f362a in mp4boxMain /benchmarks/gpac/applications/mp4box/main.c:4186:6
#10 0x7fd08b334d8f (/lib/x86_64-linux-gnu/libc.so.6+0x2dd8f)
#11 0x7fd08b334e3f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2de3f)
#12 0x422894 in _start (/benchmarks/gpac/bin/gcc/MP4Box+0x422894)
Address 0x7fffb9edac9c is located in stack of thread T0 at offset 220 in frame
#0 0xa05aaf in gf_import_mpeg_ts /benchmarks/gpac/src/media_tools/media_import.c:8857
This frame has 3 object(s):
[32, 220) 'data' (line 8860) <== Memory access at offset 220 overflows this variable
[288, 181424) 'tsimp' (line 8861)
[181680, 182680) 'progress' (line 8866)
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow /benchmarks/gpac/src/utils/bitstream.c:211:16 in BS_ReadByte
Shadow bytes around the buggy address:
0x1000773d3540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000773d3550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000773d3560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000773d3570: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00
0x1000773d3580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x1000773d3590: 00 00 00[04]f2 f2 f2 f2 f2 f2 f2 f2 00 00 00 00
0x1000773d35a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000773d35b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000773d35c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000773d35d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000773d35e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==2022026==ABORTING
```
## POC3
```
=================================================================
==2022028==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6140000001fa at pc 0x00000048ac67 bp 0x7ffc203c2c90 sp 0x7ffc203c2450
READ of size 443 at 0x6140000001fa thread T0
#0 0x48ac66 in strdup (/benchmarks/gpac/bin/gcc/MP4Box+0x48ac66)
#1 0xd85ddf in metx_Read /benchmarks/gpac/src/isomedia/box_code_base.c
#2 0x7b8177 in gf_isom_box_read /benchmarks/gpac/src/isomedia/box_funcs.c:1323:9
#3 0x7b8177 in gf_isom_box_parse_ex /benchmarks/gpac/src/isomedia/box_funcs.c:196:15
#4 0x7b9b30 in gf_isom_box_array_read_ex /benchmarks/gpac/src/isomedia/box_funcs.c:1217:7
#5 0xd61449 in minf_Read /benchmarks/gpac/src/isomedia/box_code_base.c:3503:6
#6 0x7b8177 in gf_isom_box_read /benchmarks/gpac/src/isomedia/box_funcs.c:1323:9
#7 0x7b8177 in gf_isom_box_parse_ex /benchmarks/gpac/src/isomedia/box_funcs.c:196:15
#8 0x7b9b30 in gf_isom_box_array_read_ex /benchmarks/gpac/src/isomedia/box_funcs.c:1217:7
#9 0xd5decf in mdia_Read /benchmarks/gpac/src/isomedia/box_code_base.c:3028:13
#10 0x7b8177 in gf_isom_box_read /benchmarks/gpac/src/isomedia/box_funcs.c:1323:9
#11 0x7b8177 in gf_isom_box_parse_ex /benchmarks/gpac/src/isomedia/box_funcs.c:196:15
#12 0x7b9b30 in gf_isom_box_array_read_ex /benchmarks/gpac/src/isomedia/box_funcs.c:1217:7
#13 0xd7aece in trak_Read /benchmarks/gpac/src/isomedia/box_code_base.c:7019:6
#14 0x7b8177 in gf_isom_box_read /benchmarks/gpac/src/isomedia/box_funcs.c:1323:9
#15 0x7b8177 in gf_isom_box_parse_ex /benchmarks/gpac/src/isomedia/box_funcs.c:196:15
#16 0x7b9b30 in gf_isom_box_array_read_ex /benchmarks/gpac/src/isomedia/box_funcs.c:1217:7
#17 0xd6318f in moov_Read /benchmarks/gpac/src/isomedia/box_code_base.c:3748:6
#18 0x7b8177 in gf_isom_box_read /benchmarks/gpac/src/isomedia/box_funcs.c:1323:9
#19 0x7b8177 in gf_isom_box_parse_ex /benchmarks/gpac/src/isomedia/box_funcs.c:196:15
#20 0x7b73b3 in gf_isom_parse_root_box /benchmarks/gpac/src/isomedia/box_funcs.c:42:8
#21 0x7d6ae8 in gf_isom_parse_movie_boxes /benchmarks/gpac/src/isomedia/isom_intern.c:204:7
#22 0x7da4a1 in gf_isom_open_file /benchmarks/gpac/src/isomedia/isom_intern.c:604:19
#23 0x4eb2b2 in mp4boxMain /benchmarks/gpac/applications/mp4box/main.c:4106:11
#24 0x7f92195d6d8f (/lib/x86_64-linux-gnu/libc.so.6+0x2dd8f)
#25 0x7f92195d6e3f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2de3f)
#26 0x422894 in _start (/benchmarks/gpac/bin/gcc/MP4Box+0x422894)
0x6140000001fa is located 0 bytes to the right of 442-byte region [0x614000000040,0x6140000001fa)
allocated by thread T0 here:
#0 0x49f09d in __interceptor_malloc (/benchmarks/gpac/bin/gcc/MP4Box+0x49f09d)
#1 0xd85c2d in metx_Read /benchmarks/gpac/src/isomedia/box_code_base.c:8274:8
SUMMARY: AddressSanitizer: heap-buffer-overflow (/benchmarks/gpac/bin/gcc/MP4Box+0x48ac66) in strdup
Shadow bytes around the buggy address:
0x0c287fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c287fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c287fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c287fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c287fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c287fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[02]
0x0c287fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c287fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c287fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c287fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c287fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==2022028==ABORTING
```
## POC file
[old_poc.zip](https://github.com/gpac/gpac/files/8273859/old_poc.zip)
## acknowledgement
[nipc](http://www.nipc.org.cn/)
| [BUG] several possible unfix bugs | https://api.github.com/repos/gpac/gpac/issues/2144/comments | 1 | 2022-03-16T20:48:25Z | 2022-03-21T15:00:59Z | https://github.com/gpac/gpac/issues/2144 | 1,171,537,972 | 2,144 |
[
"gpac",
"gpac"
] | [gpac-2.1-DEV-rev48-gf6d6225a-master-x64.exe](https://download.tsi.telecom-paristech.fr/gpac/new_builds/win64/gpac-2.1-DEV-rev48-gf6d6225a-master-x64.exe)
When I open osmo4, it opens a grey window and closes after a few seconds. When opening with a console I see ```[Compositor] OpenGL shaders not supported```. | Opening osmo4 in Win11 VM fails | https://api.github.com/repos/gpac/gpac/issues/2143/comments | 6 | 2022-03-16T09:06:35Z | 2022-11-08T06:25:57Z | https://github.com/gpac/gpac/issues/2143 | 1,170,731,749 | 2,143 |
[
"gpac",
"gpac"
] | I have installed the gpac with exe file from https://gpac.wp.imt.fr/downloads/, and i can find osmo4 player in my computer. now I want play the demo in http://download.tsi.telecom-paristech.fr/gpac/SRD/srd_hevc/multi_rate_p60/ using osmo4. But I can not open or add the file with osmo4 gui. Any idea? thanks a lot. | how to use osmo4 to play a video? | https://api.github.com/repos/gpac/gpac/issues/2142/comments | 7 | 2022-03-16T00:44:39Z | 2022-03-22T07:49:15Z | https://github.com/gpac/gpac/issues/2142 | 1,170,408,302 | 2,142 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
When using MP4box to segment MP4 files using inband parameter sets for bitstream switching the generated manifest references non-existent initialization segments. Only one initialization-segment is produced, which is fine, but the MPD-file references it like this: `initialization="ib_$RepresentationID$_.mp4"`. The template string contains the `$RepresentationID`, which probably shouldn't be the case, when only a single init segment is generated.
Invocation:
```
./bin/gcc/MP4Box -dash 4000 -rap -bs-switching inband -segment-name 'ib_$RepresentationID$_$Number%03d$' -out ./inband.mpd foreman_qp30.266 foreman_qp40.266
```
Output files:
```
ib_1_001.m4s
ib_1_002.m4s
ib_1_.mp4
ib_2_001.m4s
ib_2_002.m4s
inband.mpd
```
MPD-file:
```xml
<?xml version="1.0"?>
<!-- MPD file Generated with GPAC version 2.1-DEV-rev48-gf6d6225a9-master at 2022-03-15T12:40:30.266Z -->
<MPD xmlns="urn:mpeg:dash:schema:mpd:2011" minBufferTime="PT1.500S" type="static" mediaPresentationDuration="PT0H0M6.000S" maxSegmentDuration="PT0H0M5.120S" profiles="urn:mpeg:dash:profile:full:2011">
<ProgramInformation moreInformationURL="http://gpac.io">
<Title>inband.mpd generated by GPAC</Title>
</ProgramInformation>
<Period duration="PT0H0M6.000S">
<AdaptationSet segmentAlignment="true" maxWidth="352" maxHeight="288" maxFrameRate="50" par="11:9" lang="und" bitstreamSwitching="true" startWithSAP="1">
<SegmentTemplate media="ib_$RepresentationID$_$Number%03d$.m4s" initialization="ib_$RepresentationID$_.mp4" timescale="50" startNumber="1" duration="200"/>
<Representation id="1" mimeType="video/mp4" codecs="vvi1.1.L35.CQA" width="352" height="288" frameRate="50" sar="1:1" bandwidth="330000">
</Representation>
<Representation id="2" mimeType="video/mp4" codecs="vvi1.1.L35.CQA" width="352" height="288" frameRate="50" sar="1:1" bandwidth="87281">
</Representation>
</AdaptationSet>
</Period>
</MPD>
```
I have not yet tested if this is a general problem or specific to working with VVC bitstreams. | MPD references non-existent initialization segment | https://api.github.com/repos/gpac/gpac/issues/2141/comments | 1 | 2022-03-15T12:53:49Z | 2022-03-22T08:45:49Z | https://github.com/gpac/gpac/issues/2141 | 1,169,636,455 | 2,141 |
[
"gpac",
"gpac"
] | [POC](https://drive.google.com/file/d/19V3_2svctUfavMRpZ6QFgemglsETXXtK/view?usp=sharing)
```
Description
Integer Overflow in MP4Box
Command
MP4Box -bt [POC7](https://drive.google.com/file/d/19V3_2svctUfavMRpZ6QFgemglsETXXtK/view?usp=sharing)
ASAN result
isomedia/box_code_base.c:413:29: runtime error: negation of -2147483648 cannot be represented in type 's32' (aka 'int'); cast to an unsigned type to negate this value to itself
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior isomedia/box_code_base.c:413:29 in
Occurrences
box_code_base.c L413
``` | Integer Overflow or Wraparound | https://api.github.com/repos/gpac/gpac/issues/2140/comments | 1 | 2022-03-14T09:01:56Z | 2022-03-14T15:19:24Z | https://github.com/gpac/gpac/issues/2140 | 1,168,075,634 | 2,140 |
[
"gpac",
"gpac"
] | I already googled-fu it but i found no info about this. | [Question]How to add and/or extract vobsub(idx,sub) files | https://api.github.com/repos/gpac/gpac/issues/2139/comments | 1 | 2022-03-13T21:57:01Z | 2022-03-14T16:25:55Z | https://github.com/gpac/gpac/issues/2139 | 1,167,704,796 | 2,139 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
***Describe the bug***
There is a heap-buffer-overflow bug, which can be triggered via MP4Box+ ASan
***To Reproduce***
Steps to reproduce the behavior:
```
./configure --cc=clang --cxx=clang++ --enable-sanitizer
make -j$(nproc)
./bin/gcc/MP4Box -diso POC
```
Output:
```
[iso file] Box "moof" (start 0) has 3 extra bytes
[iso file] Movie fragment but no moov (yet) - possibly broken parsing!
[iso file] Box "moof" (start 23) has 3 extra bytes
[iso file] Box "moof" (start 34) has 3 extra bytes
[iso file] Box "moof" (start 77) has 3 extra bytes
[iso file] Box "tref" (start 45) has 4 extra bytes
[iso file] Unknown top-level box type 0005hEB
=================================================================
==1787100==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000001012 at pc 0x0000005b4fdc bp 0x7ffde5e08a70 sp 0x7ffde5e08a68
WRITE of size 1 at 0x602000001012 thread T0
#0 0x5b4fdb in gf_base64_encode /home/hzheng/workspace/benchmarks/reproduce/gpac/src/utils/base_encoding.c:48:13
#1 0x8fdb6b in colr_box_dump /home/hzheng/workspace/benchmarks/reproduce/gpac/src/isomedia/box_dump.c:5493:15
#2 0x90c095 in gf_isom_box_dump /home/hzheng/workspace/benchmarks/reproduce/gpac/src/isomedia/box_funcs.c:2076:2
#3 0x8cf29c in gf_isom_dump /home/hzheng/workspace/benchmarks/reproduce/gpac/src/isomedia/box_dump.c:135:3
#4 0x539be2 in dump_isom_xml /home/hzheng/workspace/benchmarks/reproduce/gpac/applications/mp4box/filedump.c:1954:6
#5 0x51939b in mp4boxMain /home/hzheng/workspace/benchmarks/reproduce/gpac/applications/mp4box/main.c:6155:7
#6 0x7faccbbfc0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#7 0x41fdad in _start (/home/hzheng/workspace/benchmarks/reproduce/gpac/bin/gcc/MP4Box+0x41fdad)
0x602000001012 is located 0 bytes to the right of 2-byte region [0x602000001010,0x602000001012)
allocated by thread T0 here:
#0 0x4c58ff in malloc /home/hzheng/env/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3
#1 0x8fdb37 in gf_malloc /home/hzheng/workspace/benchmarks/reproduce/gpac/src/utils/alloc.c:150:9
#2 0x8fdb37 in colr_box_dump /home/hzheng/workspace/benchmarks/reproduce/gpac/src/isomedia/box_dump.c:5492:20
#3 0x90c095 in gf_isom_box_dump /home/hzheng/workspace/benchmarks/reproduce/gpac/src/isomedia/box_funcs.c:2076:2
#4 0x8cf29c in gf_isom_dump /home/hzheng/workspace/benchmarks/reproduce/gpac/src/isomedia/box_dump.c:135:3
#5 0x539be2 in dump_isom_xml /home/hzheng/workspace/benchmarks/reproduce/gpac/applications/mp4box/filedump.c:1954:6
#6 0x51939b in mp4boxMain /home/hzheng/workspace/benchmarks/reproduce/gpac/applications/mp4box/main.c:6155:7
#7 0x7faccbbfc0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/hzheng/workspace/benchmarks/reproduce/gpac/src/utils/base_encoding.c:48:13 in gf_base64_encode
Shadow bytes around the buggy address:
0x0c047fff81b0: fa fa 07 fa fa fa fd fa fa fa 04 fa fa fa 00 02
0x0c047fff81c0: fa fa fd fa fa fa 00 07 fa fa 00 00 fa fa 00 00
0x0c047fff81d0: fa fa 00 fa fa fa fd fa fa fa 00 04 fa fa 00 00
0x0c047fff81e0: fa fa 00 00 fa fa 01 fa fa fa 00 00 fa fa 00 00
0x0c047fff81f0: fa fa 04 fa fa fa 00 00 fa fa 04 fa fa fa 01 fa
=>0x0c047fff8200: fa fa[02]fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8230: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8240: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==1787100==ABORTING
```
***Environment***
gpac commit 54e9ed807fd24d83aa051fb097466d8760225401
clang release/12.x
ubuntu 20.04
***POC***
[POC.zip](https://github.com/gpac/gpac/files/8222176/POC.zip)
***Credit***
Han Zheng
[NCNIPC of China](http://www.nipc.org.cn)
[Hexhive](http://hexhive.epfl.ch/) | [BUG] heap-buffer-overflow in gf_base64_encode | https://api.github.com/repos/gpac/gpac/issues/2138/comments | 3 | 2022-03-10T09:47:43Z | 2022-08-03T09:44:25Z | https://github.com/gpac/gpac/issues/2138 | 1,164,990,736 | 2,138 |
[
"gpac",
"gpac"
] | - [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC.
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...).
Hi,
For the provided test input, `MP4Box -bt issue-2137 -std` would produce inconsistent results. To reproduce:
- gpac: git head at the time of report (commit 595e437b3de00bce23d09306d23fbc891334e241)
- Compile gpac with `-O0` and `-O3` with either gcc or clang.
- Run `MP4Box-O0 -bt issue-2137 -std > out-O0.txt` and `MP4Box-O3 -bt issue-2137 -std > out-O3.txt`.
[issue-2137.tar.gz](https://github.com/gpac/gpac/files/8215398/issue-2137.tar.gz)
- Here are the diff result:
```
$ diff out-O0.txt out-O3.txt
65,66c65,66
< fromTo 0.00392157 3.60988e-38
< key [4.03322e-41 0 0 0 0 4.50097e-42]
---
> fromTo 0 0
> key [0 0 0 0 0 0]
```
I tried to check with AddressSanitizer, UndefinedSanitizer, and MemorySanitizer, none of them complained. | Inconsistent/incorrect "fromTo" and "key" values produced by `MP4Box -bt` | https://api.github.com/repos/gpac/gpac/issues/2137/comments | 0 | 2022-03-09T14:18:29Z | 2022-03-09T17:41:29Z | https://github.com/gpac/gpac/issues/2137 | 1,163,998,809 | 2,137 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
| GPAC + kvazaar RTMP input works but UDP does not. | https://api.github.com/repos/gpac/gpac/issues/2136/comments | 17 | 2022-03-09T08:55:43Z | 2022-04-23T13:11:41Z | https://github.com/gpac/gpac/issues/2136 | 1,163,659,447 | 2,136 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [ yes] I looked for a similar issue and couldn't find any.
- [yes ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [yes ] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
we found an a/v sync issue in mp4box converted fragment mp4
check below command
mp4box is from gpac https://github.com/gpac/gpac/wiki/MP4Box
mp4fragment is from bento4 https://www.bento4.com/
input: normal.mp4
mp4fragment normal.mp4 mp4frag.mp4
output: mp4frag.mp4
mp4box -dash 20000 -profile onDemand -out output.mpd normal.mp4
output: output.mpd normal_dashinit.mp4
files are here . https://mega.nz/file/PagnkAzJ#-OYNK78tw9XJsyAzh42Tv4FSPisN2pl6-X7tLKfxisw
normal.mp4 and mp4frag.mp4 can be played well in mac quicktime player Version 10.5 (1086.4.2)
output.mpd and normal_dashinit.mp4 can be played well in all browser player
However mp4box output normal_dashinit.mp4 could a trigger a a/v sync issue while seeking in quicktime player
try to seek to the middle position of the mp4, you will found the count down a/v is not sync.
and normal_dashinit.mp4 has no audio for some time in latest version VLC player(Version 3.0.16 Vetinari (Intel 64bit) )
mp4frag.mp4 and normal_dashinit.mp4 are all fragment mp4 , although the format is a little different.
I guess there must be some timestamps wrong in the mp4 header , it caused this av sync issue
may be related to this issue, I am not sure.
https://stackoverflow.com/questions/63262104/fragmented-mp4-not-playing-in-ffplay-quicktime-safari-but-in-vlc
| a/v sync issue in mp4box converted fragment mp4 | https://api.github.com/repos/gpac/gpac/issues/2135/comments | 8 | 2022-03-08T11:28:09Z | 2022-03-17T12:36:32Z | https://github.com/gpac/gpac/issues/2135 | 1,162,542,633 | 2,135 |
[
"gpac",
"gpac"
] | Hello,
I am building ffmpeg and mp4box with the [ffmpeg-windows-build-helpers](https://github.com/rdp/ffmpeg-windows-build-helpers)
Since recently mp4box building is compromised.
I think it has something to do with a typo in the file `utils/os_file.c`.
There it says in lines 411, 422 and 877: `st.st_mtim.tv_nsec`.
I think it should say `st.st_mtime.tv_nsec`.
Could you please check and fix that? Thanks. :)
> Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
>
> - [X] I looked for a similar issue and couldn't find any.
> - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
> - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
>
> Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ | Building of mp4box not working | https://api.github.com/repos/gpac/gpac/issues/2134/comments | 5 | 2022-03-07T14:44:44Z | 2022-03-14T12:44:56Z | https://github.com/gpac/gpac/issues/2134 | 1,161,513,295 | 2,134 |
[
"gpac",
"gpac"
] | POC: https://drive.google.com/file/d/1Iz529FflMClr-NcgRvWSyoPDKbU70dqw/view
```
Command
MP4Box -info POC6
ASAN result
[iso file] Unknown box type url@ in parent dref
[iso file] Unknown box type traj in parent moov
[iso file] Unknown box type 80rak in parent moov
[iso file] Incomplete box mdat - start 11495 size 901165
[iso file] Incomplete file while reading for dump - aborting parsing
# Movie Info - 4 tracks - TimeScale 90000
Duration 00:00:22.839 (recomputed 00:00:25.004)
Fragmented: no
Progressive (moov before mdat)
Major Brand isom - version 1 - compatible brands:
Created: GMT Wed Sep 14 06:08:31 2078
Modified: GMT Wed Sep 14 06:08:33 2078
File has root IOD (96 bytes)
Scene PL 0xff - Graphics PL 0xff - OD PL 0xff
Visual PL: Simple Profile @ Level 1 (0x01)
Audio PL: High Quality Audio Profile @ Level 2 (0x0f)
1 UDTA types:
hnti:
# Track 1 Info - ID 1 - TimeScale 90000
Media Duration 00:00:22.800
Track uses external data reference not supported by GPAC!
Track flags: Enabled
Media Info: Language "Undetermined (und)" - Type "vide:mp4v" - 342 samples
Media Data Location: (null)
Visual Sample Entry Info: width=176 height=144 (depth=24 bits)
Visual Track layout: x=0 y=0 width=176 height=144
MPEG-4 Config: Visual Stream - ObjectTypeIndication 0x20
MPEG-4 Visual Size 176 x 144 - Simple Profile @ Level 3
Pixel Aspect Ratio 1:1 - Indicated track size 176 x 144
Synchronized on stream 7
RFC6381 Codec Parameters: mp4v.20.3
Average GOP length: 31 samples
Max sample duration: 6000 / 90000
# Track 2 Info - ID 2 - TimeScale 82064
Media Duration 00:00:25.004
Track flags: Disabled
Media Info: Language "Undetermined (und)" - Type "hint:rtp " - 342 samples
2 UDTA types:
hnti:
hanf: isomedia/isom_read.c:2726:22: runtime error: null pointer passed as argument 2, which is declared to never be null
/usr/include/string.h:44:28: note: nonnull attribute specified here
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior isomedia/isom_read.c:2726:22 in
Occurrences
isom_read.c L2726
``` | NULL Pointer Dereference | https://api.github.com/repos/gpac/gpac/issues/2133/comments | 0 | 2022-03-07T11:06:17Z | 2022-03-07T13:55:02Z | https://github.com/gpac/gpac/issues/2133 | 1,161,266,778 | 2,133 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC.
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...).
Hi,
I built `gpac` twice with `gcc-11 -O0` and `gcc-11 -O3` separately. For the provided input, `MP4Box -dxml` would produce different outputs. Reproduce as follows:
- Compile `gpac` twice with `gcc-11 -O0` and `gcc-11 -O3` to obtain two versions MP4Box: `MP4Box-O0` and `MP4Box-O3`
- Run `MP4Box-O0 -dxml $issue-2132 -std > out-O0.txt 2>&1` and `MP4Box-O3 -dxml $issue-2132 -std > out-O3.txt 2>&1`
- Compare with `diff -y out-O0.txt out-O3.txt` and you'll see these two files differ (`out-O3.txt` shown on the right has two more lines than `out-O1.txt`)
[issue-2132.tar.gz](https://github.com/gpac/gpac/files/8190809/issue-2132.tar.gz)
```
< <!-- NALU number 1 is corrupted: size is 41061584 but only 2 remains -->
---
> <!-- NALU number 1 is corrupted: size is 0 but only 2 remains -->
124c124
< <!-- NALU number 1 is corrupted: size is 41061584 but only 2 remains -->
---
> <!-- NALU number 1 is corrupted: size is 0 but only 2 remains -->
```
I reported a similar bug before (https://github.com/gpac/gpac/issues/2130), which was due to an uninitialized variable. I guess this s might have a similar root cause. I tried to build gpac with clang's MemorySanitizer but failed. `Valgrind` would produce more than a hundred errors on this input. I'm not sure if that's useful or not. | Incorrect result produced by `MP4Box -dxml` | https://api.github.com/repos/gpac/gpac/issues/2132/comments | 0 | 2022-03-05T14:10:05Z | 2022-03-07T14:07:09Z | https://github.com/gpac/gpac/issues/2132 | 1,160,361,817 | 2,132 |
[
"gpac",
"gpac"
] |
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC.
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...).
Hi,
For the provided test input, `MP4Box -bt issue-2131 -std` would produce different results per run. To reproduce
- Compiler: gcc-11 (doesn't really matter, I tried with clang-13 as well)
- Platform: Ubuntu20.04.3 LTS, x86_64
- gpac version: git HEAD f6b88a11929c7163f2caf91d245ae4ca83ccc10a
- Run `MP4Box -bt issue-2131 -std` multiple times and you'll observe they produce different results. Below are `diff` results of two runs.
[issue-2131.tar.gz](https://github.com/gpac/gpac/files/8181421/issue-2131.tar.gz)
```
< <animateTransform stroke-dasharray="21973.3 -4436.52 -12676 -512.191 -8273.79 -15172.3 -28005.3 -25940.1 22759.9 -4740.63 -10242.8 -20608.5 31695.2 -3568.77 -3120.69 -11560 10879.7 -11866.1 -20644.6 -18754.6 15603.8 24249.6 -2674.55 -28456.3 13803.6 27606 -11518.8 -32372 -32159.9 -24575.9 2436.25 19457.3 -26618.5 -8176.5 20634.1 8392.33 9094.96 -27302.7 22973.9 -12352 -144.316 15072 12788.4 17402.8 -669.039 17900.8 27865.1 -19611.7 -25849.2 -32332.8 27864" image-rendering="optimizeQuality" space="default" end="indefinite" class="b�D" type="scale" calcMode="linear" values="10402.8 -24144;21546.1 -31402.8;-19981 31934.4;24279.6 -8201.56;-17249.5 20129.7;-24046 -31613.8;11959.7 28462.5;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;0 512;2.41703e-37;2.41703e-37;0 3840;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;16384 960;2.41703e-37;2.41703e-37;2.41703e-37;0 512;2.41703e-37;2.41703e-37;0 2048;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;-16384 960;2.41703e-37;2.41703e-37;2.41703e-37;-16384 960;2.41703e-37;2.41703e-37;2.41703e-37;-16384 960;2.41703e-37;2.41703e-37;2.41703e-37;-16384 960;2.41703e-37;2.41703e-37;2.41703e-37;-16384 512;2.41703e-37;2.41703e-37;2.41703e-37;16384 512;2.41703e-37;2.41703e-37;2.41703e-37;0 512;2.41703e-37;2.41703e-37;0 3840;2.41703e-37;2.41703e-37;2.41703e-37;0 2048;2.41703e-37;2.41703e-37;2.41703e-37;2.41703e-37;-16384 960;2.41703e-37;2.41703e-37;2.41703e-37;16384 512;2.41703e-37;2.41703e-37;2.41703e-37;0 512;2.41703e-37;2.41703e-37" dur="0s"/>
---
> <animateTransform stroke-dasharray="21973.3 -4436.52 -12676 -512.191 -8273.79 -15172.3 -28005.3 -25940.1 22759.9 -4740.63 -10242.8 -20608.5 31695.2 -3568.77 -3120.69 -11560 10879.7 -11866.1 -20644.6 -18754.6 15603.8 24249.6 -2674.55 -28456.3 13803.6 27606 -11518.8 -32372 -32159.9 -24575.9 2436.25 19457.3 -26618.5 -8176.5 20634.1 8392.33 9094.96 -27302.7 22973.9 -12352 -144.316 15072 12788.4 17402.8 -669.039 17900.8 27865.1 -19611.7 -25849.2 -32332.8 27864" image-rendering="optimizeQuality" space="default" end="indefinite" class="b�D" type="scale" calcMode="linear" values="10402.8 -24144;21546.1 -31402.8;-19981 31934.4;24279.6 -8201.56;-17249.5 20129.7;-24046 -31613.8;11959.7 28462.5;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;0 512;9.07315e-38;9.07315e-38;0 3840;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;16384 960;9.07315e-38;9.07315e-38;9.07315e-38;0 512;9.07315e-38;9.07315e-38;0 2048;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;-16384 960;9.07315e-38;9.07315e-38;9.07315e-38;-16384 960;9.07315e-38;9.07315e-38;9.07315e-38;-16384 960;9.07315e-38;9.07315e-38;9.07315e-38;-16384 960;9.07315e-38;9.07315e-38;9.07315e-38;-16384 512;9.07315e-38;9.07315e-38;9.07315e-38;16384 512;9.07315e-38;9.07315e-38;9.07315e-38;0 512;9.07315e-38;9.07315e-38;0 3840;9.07315e-38;9.07315e-38;9.07315e-38;0 2048;9.07315e-38;9.07315e-38;9.07315e-38;9.07315e-38;-16384 960;9.07315e-38;9.07315e-38;9.07315e-38;16384 512;9.07315e-38;9.07315e-38;9.07315e-38;0 512;9.07315e-38;9.07315e-38" dur="0s"/>
```
I tried to use AddressSanitizer, UndefinedSanitizer, and MemorySanitizer, all of them didn't complain. Based on the results, I suspect it's probably due to floating-point imprecision.
| Unstable output produced by `MP4Box` | https://api.github.com/repos/gpac/gpac/issues/2131/comments | 0 | 2022-03-03T21:57:45Z | 2022-03-07T13:55:03Z | https://github.com/gpac/gpac/issues/2131 | 1,158,938,281 | 2,131 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Hi,
I built `gpac` twice with `gcc-11 -O0` and `gcc-11 -O3` separately. For the provided input, `MP4Box -bt` would produce different outputs/warnings. Reproduce as follows:
- Compile `gpac` twice with `gcc-11 -O0` and `gcc-11 -O3` to obtain two versions MP4Box: `MP4Box-O0` and `MP4Box-O3`
- Run `MP4Box-O0 -bt $issue-2130 -std > out-O0.txt 2>&1` and `MP4Box-O3 -bt $issue-2130 -std > out-O3.txt 2>&1`
- Compare with `diff -y out-O0.txt out-O3.txt` and you'll see these two files differ (`out-O3.txt` shown on the right has two more lines than `out-O1.txt`)
[issue-2130.tar.gz](https://github.com/gpac/gpac/files/8171226/issue-2130.tar.gz)
```
[33m[ISO file] dataReferenceIndex set to 0 in sample entry, o [33m[ISO file] dataReferenceIndex set to 0 in sample entry, o
[isom/avcc] Missing REXT profile signaling, patching. [isom/avcc] Missing REXT profile signaling, patching.
[iso file] Missing DataInformationBox [iso file] Missing DataInformationBox
[iso file] Box "saiz" (start 1128) has 8 extra bytes [iso file] Box "saiz" (start 1128) has 8 extra bytes
[iso file] Warning: trackID of MOOF/TRAF(2) is not the [iso file] Warning: trackID of MOOF/TRAF(2) is not the
> [iso file] saiz box without flags nor aux info type an
[iso file] senc box without tenc, assuming MS smooth+p [iso file] senc box without tenc, assuming MS smooth+p
[isobmf] cannot parse senc, missing IV/crypto state [isobmf] cannot parse senc, missing IV/crypto state
[iso file] Unknown top-level box type D2E498FF [iso file] Unknown top-level box type D2E498FF
[iso file] Incomplete box D2E498FF - start 1965 size 1 [iso file] Incomplete box D2E498FF - start 1965 size 1
[iso file] Incomplete file while reading for dump - ab [iso file] Incomplete file while reading for dump - ab
[ISO file] dataReferenceIndex set to 0 in sample entry [ISO file] dataReferenceIndex set to 0 in sample entry
[isom/avcc] Missing REXT profile signaling, patching. [isom/avcc] Missing REXT profile signaling, patching.
[iso file] Missing DataInformationBox [iso file] Missing DataInformationBox
[iso file] Box "saiz" (start 1128) has 8 extra bytes [iso file] Box "saiz" (start 1128) has 8 extra bytes
[iso file] Warning: trackID of MOOF/TRAF(2) is not the [iso file] Warning: trackID of MOOF/TRAF(2) is not the
> [iso file] saiz box without flags nor aux info type an
[iso file] senc box without tenc, assuming MS smooth+p [iso file] senc box without tenc, assuming MS smooth+p
[isobmf] cannot parse senc, missing IV/crypto state [isobmf] cannot parse senc, missing IV/crypto state
[iso file] Unknown top-level box type D2E498FF [iso file] Unknown top-level box type D2E498FF
[iso file] Incomplete box D2E498FF - start 1965 size 1 [iso file] Incomplete box D2E498FF - start 1965 size 1
[iso file] Incomplete file while reading for dump - ab [iso file] Incomplete file while reading for dump - ab
Scene loaded - dumping root scene Scene loaded - dumping root scene
```
| Incorrect/inconsistent results produced by `MP4Box -bt` because of uninitialized variable `scheme_type ` in track.c | https://api.github.com/repos/gpac/gpac/issues/2130/comments | 2 | 2022-03-02T16:32:05Z | 2022-03-05T14:03:59Z | https://github.com/gpac/gpac/issues/2130 | 1,157,425,096 | 2,130 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
I use `gpac` reading `RTMP` input and serve them with ll-hls, the command is like:
```
gpac -i 'rtmp://:1935/live/abc:gpac:rtmp_listen=1' reframer:rt=on -o http://127.0.0.1:8080/ll-hls/live.m3u8:gpac:segdur=4:cdur=1:profile=live:dmode=dynamic:hmode=push:llhls=sf
```
Now I want to add some arguments which can transcode rtmp to different resolution streams and use ll-hls provide these streams so web player can choose one of them by estimated bandwidth, which is so called adaptive stream media. I have read documents and found nothing. I want to know whether `gpac` support this operation and how to change above command.
Thank you. | can gpac transcode one rtmp input to several streams with different resolution and output them with one ll-hls? | https://api.github.com/repos/gpac/gpac/issues/2129/comments | 15 | 2022-02-28T17:19:56Z | 2022-03-21T13:51:13Z | https://github.com/gpac/gpac/issues/2129 | 1,154,352,511 | 2,129 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
I want to modify the value of `PART-HOLD-BACK` in tag `#EXT-X-SERVER-CONTROL` and I don't find any use message in documentation. is There a configuration so I can modify this value use `gpac`?
| How do I modify the value of PART-HOLD-BACK ? | https://api.github.com/repos/gpac/gpac/issues/2128/comments | 2 | 2022-02-27T15:29:45Z | 2022-03-07T19:12:28Z | https://github.com/gpac/gpac/issues/2128 | 1,153,291,255 | 2,128 |
[
"gpac",
"gpac"
] | I'm using 2 MKVs; videos are successfully merged, but without an audiable audio track.
"[NULL] invalid sync code
Appending file X.mkv
No suitable destination track found - creating new one (type vide)
No suitable destination track found - creating new one (type soun)"
This is the only error message I can see.
Codec is standard FLAC. | GPAC 2.0 Concat 2 Different Resolutions -> No Audio | https://api.github.com/repos/gpac/gpac/issues/2127/comments | 4 | 2022-02-27T08:33:14Z | 2022-04-12T12:51:39Z | https://github.com/gpac/gpac/issues/2127 | 1,153,049,507 | 2,127 |
[
"gpac",
"gpac"
] | Hello, this is less of an issue and more of a request for some information/assistance. I'd like to see if I can get the OpenXR loader working inside of GPAC's video player to allow a majority of the current VR runtimes (SteamVR, Monado, etc.) to work with GPAC so that non-mobile headsets can be used to watch 360 videos as well. There is also some coming support for standalone headsets such as the Quest 2, so it could also be a possible solution for this issue #1937.
What I've done so far -
Explored OpenXR Loader Structure
Explored GPAC source looking for render/frame update sections
Realized that I need to get the viewport frame(s) / frame buffer(s) instead of the full frame buffer(s)
My questions -
1. Where are the buffers and frame update functions for the viewport in VR mode? (I've been looking in camera.c, visual_manager.c, visual_manager_3d.c, but haven't found anything specifically viewport, might just be missing them)
2. Is there an implementation somewhere for Z-axis rotation of the camera in VR mode? (I knew there is one for X and Y because the current 360 player exists, but tilting the viewport was something I wasn't able to find in camera.c or navigate.c)
3. I remember there was a section on viewport resizing, but is there anything dedicated to FOV based viewport size or is it resolution based only?
An answer to these three questions would be a great help thank you for your time!
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
| OpenXR Implementation for VR Mode (360Videos) | https://api.github.com/repos/gpac/gpac/issues/2126/comments | 5 | 2022-02-24T20:50:09Z | 2022-10-10T17:00:26Z | https://github.com/gpac/gpac/issues/2126 | 1,149,736,410 | 2,126 |
[
"gpac",
"gpac"
] | - [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Hi, thanks for the new release! However, I can't seem to be able to build MP4Box on neither Ubuntu, nor Arch Linux.
On Ubuntu I get:
```
/usr/bin/ld: /usr/lib/gcc/x86_64-linux-gnu/11/../../../x86_64-linux-gnu/libfreetype.a(sfnt.o): in function `woff2_open_font':
(.text+0xb76d): undefined reference to `BrotliDecoderDecompress'
collect2: error: ld returned 1 exit status
make[2]: *** [Makefile:56: gpac] Error 1
```
Following either the [new](https://github.com/gpac/gpac/wiki/GPAC-Build-Guide-for-Linux) instructions or the [old](https://github.com/gpac/gpac/wiki/GPAC-build-MP4Box-only-all-platforms).
On Arch Linux I get:
```
/usr/bin/ld: cannot find -lnghttp2: No such file or directory
collect2: error: ld returned 1 exit status
make[2]: *** [Makefile:56: gpac] Error 1
```
I do have `libnghttp2` and `nghttp2` installed, not sure why I get this error...
Ideas for both distributions? | [2.0.0] Cannot build on Ubuntu and Arch Linux | https://api.github.com/repos/gpac/gpac/issues/2125/comments | 10 | 2022-02-23T13:30:26Z | 2022-02-25T18:36:04Z | https://github.com/gpac/gpac/issues/2125 | 1,148,099,372 | 2,125 |
[
"gpac",
"gpac"
] |
[poc.zip](https://github.com/gpac/gpac/files/8096924/poc.zip)
```
Version:
MP4Box - GPAC version 1.1.0-DEV-rev1762-g90a145735-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration:
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
System information Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz
poc
base64 poc
Q0FDMAAA//RkRDIAAgwAAAA/////dQE/AAABQAAAAUEAAAFC3f//AAAAAURAAAABQQEAGELdABAA
AH//+fn5+Qj6REZERERET0RYZHMQAAB///n53PoV+URGRBRERFhEHUwAAFtERERERERE
command:
./MP4Box -info poc
Result
~/fuzzing/gpac/gpac/bin/gcc/MP4Box -info ./poc
=================================================================
==64177==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f21c83a7f50 at pc 0x7f21cc2b7304 bp 0x7ffe63c7db10 sp 0x7ffe63c7db08
READ of size 4 at 0x7f21c83a7f50 thread T0
#0 0x7f21cc2b7303 in gf_hevc_read_sps_bs_internal /home/aidai/fuzzing/gpac/gpac/src/media_tools/av_parsers.c:8202:54
#1 0x7f21cc2bac14 in gf_hevc_parse_nalu_bs /home/aidai/fuzzing/gpac/gpac/src/media_tools/av_parsers.c:8629:30
#2 0x7f21cd047756 in naludmx_parse_nal_hevc /home/aidai/fuzzing/gpac/gpac/src/filters/reframe_nalu.c:2164:8
#3 0x7f21cd047756 in naludmx_process /home/aidai/fuzzing/gpac/gpac/src/filters/reframe_nalu.c:3059:23
#4 0x7f21ccac918f in gf_filter_process_task /home/aidai/fuzzing/gpac/gpac/src/filter_core/filter.c:2573:7
#5 0x7f21cca8a32d in gf_fs_thread_proc /home/aidai/fuzzing/gpac/gpac/src/filter_core/filter_session.c:1799:3
#6 0x7f21cca86cc7 in gf_fs_run /home/aidai/fuzzing/gpac/gpac/src/filter_core/filter_session.c:2043:2
#7 0x7f21cc331e43 in gf_media_import /home/aidai/fuzzing/gpac/gpac/src/media_tools/media_import.c:1225:3
#8 0x5657dc in convert_file_info /home/aidai/fuzzing/gpac/gpac/applications/mp4box/fileimport.c:128:6
#9 0x50f745 in mp4boxMain /home/aidai/fuzzing/gpac/gpac/applications/mp4box/main.c:6052:6
#10 0x7f21cb0e70b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16
#11 0x429b9d in _start (/home/aidai/fuzzing/gpac/gpac/bin/gcc/MP4Box+0x429b9d)
0x7f21c83a7f50 is located 4240 bytes to the right of 157376-byte region [0x7f21c8380800,0x7f21c83a6ec0)
allocated by thread T0 here:
#0 0x4a22dd in malloc (/home/aidai/fuzzing/gpac/gpac/bin/gcc/MP4Box+0x4a22dd)
#1 0x7f21cd039aad in naludmx_configure_pid /home/aidai/fuzzing/gpac/gpac/src/filters/reframe_nalu.c:348:25
#2 0x7f21cc9f31a5 in gf_filter_pid_configure /home/aidai/fuzzing/gpac/gpac/src/filter_core/filter_pid.c:752:6
#3 0x7f21cca1c039 in gf_filter_pid_connect_task /home/aidai/fuzzing/gpac/gpac/src/filter_core/filter_pid.c:1061:3
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/aidai/fuzzing/gpac/gpac/src/media_tools/av_parsers.c:8202:54 in gf_hevc_read_sps_bs_internal
Shadow bytes around the buggy address:
0x0fe4b906cf90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0fe4b906cfa0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0fe4b906cfb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0fe4b906cfc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0fe4b906cfd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0fe4b906cfe0: fa fa fa fa fa fa fa fa fa fa[fa]fa fa fa fa fa
0x0fe4b906cff0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0fe4b906d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fe4b906d010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fe4b906d020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fe4b906d030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==64177==ABORTING
Occurrences
av_parsers.c L8202
``` | Heap-based Buffer Overflow | https://api.github.com/repos/gpac/gpac/issues/2124/comments | 0 | 2022-02-18T12:00:23Z | 2022-02-21T08:37:12Z | https://github.com/gpac/gpac/issues/2124 | 1,142,929,565 | 2,124 |
[
"gpac",
"gpac"
] | Hi!
At latest version 1.1.0-DEV-rev1769-g1d936f89d-master.
I tested, but not fixed.
When running #2122 - case-2, number of files grown infinitely.
#2122 - At live mode "muxtype=ts" output file will not remove. - NOT FIXED
Thanks.
-----------------------
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [*] I looked for a similar issue and couldn't find any.
- [*] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [*] I give enough information for contributors to reproduce my issue | #2122 - At live mode "muxtype=ts" output file will not remove. - NOT FIXED | https://api.github.com/repos/gpac/gpac/issues/2123/comments | 1 | 2022-02-18T11:02:55Z | 2022-02-18T12:44:26Z | https://github.com/gpac/gpac/issues/2123 | 1,142,850,357 | 2,123 |
[
"gpac",
"gpac"
] | Hi! Thanks for awesome project.
I found some problem.
At live mode "muxtype=ts" output file will not remove.
# case-1 : muxtype type is not defined : file remove successfully
> gpac flist:srcs=sample.mp4:floop=-1 reframer:rt=on @ -o "http://0.0.0.0:20275/live.mpd:dmode=dynamic:rdirs=/tmp/rdir/0:tsb=1:profile=live"
```
> ls /tmp/rdir/0
-rw-rw-r-- 1 m m 1.1K Feb 18 14:05 live.mpd
-rw-rw-r-- 1 m m 63K Feb 18 14:05 sample_dash7.m4s
-rw-rw-r-- 1 m m 929 Feb 18 14:05 sample_dashinit.mp4
```
# case-2 : muxtype type is "ts" : file *do not* remove
> gpac flist:srcs=sample.mp4:floop=-1 reframer:rt=on @ -o "http://0.0.0.0:20275/live.mpd:dmode=dynamic:rdirs=/tmp/rdir/0:tsb=1:profile=live:muxtype=ts"
```
> ls /tmp/rdir/0
-rw-rw-r-- 1 m m 1.1K Feb 18 14:04 live.mpd
-rw-rw-r-- 1 m m 38K Feb 18 14:04 sample_dash1.ts
-rw-rw-r-- 1 m m 70K Feb 18 14:04 sample_dash2.ts
-rw-rw-r-- 1 m m 76K Feb 18 14:04 sample_dash3.ts
-rw-rw-r-- 1 m m 75K Feb 18 14:04 sample_dash4.ts
-rw-rw-r-- 1 m m 58K Feb 18 14:04 sample_dash5.ts
```
--------------------------------------
- [*] I looked for a similar issue and couldn't find any.
- [* ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [*] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
| At live mode "muxtype=ts" output file will not remove. | https://api.github.com/repos/gpac/gpac/issues/2122/comments | 2 | 2022-02-18T05:09:07Z | 2022-02-18T20:01:33Z | https://github.com/gpac/gpac/issues/2122 | 1,142,367,879 | 2,122 |
[
"gpac",
"gpac"
] | Hi,
Thanks in advance for any help. Please let me know if I should send more information privately.
**Summary**
I had a `sample.mp4` file which has embedded EMSG boxes carrying custom metadata. To serve it via DASH, I used MP4Box to generate the mpd manifest file, and MP4Box generates two files for me
- `sample_dash.mpd`
- `sample_dashinit.mp4`
**Expected Result**
The EMSG boxes in the original fMP4 is preserved in `sample_dashinit.mp4` and served via `sample_dash.mpd`
**Actual Result**
The generated sample_dashinit.mp4 no longer have EMSG boxes.
**Repro Steps**
1. Take any fragmented MP4 file with EMSG boxes
2. run `MP4Box -dash 100000 sample.mp4`
3. Load the generated `sample_dashinit.mp4` using https://gpac.github.io/mp4box.js/test/filereader.html, and no EMSG boxes are in BoxView > TreeView
I might have missed any usage to preserve the EMSG boxes - can someone help advice any proper usage of MP4Box or any workaround in this case? Thanks.
Also copying the generated mpd file
```
<?xml version="1.0"?>
<!-- MPD file Generated with GPAC version 1.1.0-DEV-rev1759-geb2d1e6dd-master at 2022-02-17T06:23:14.473Z -->
<MPD xmlns="urn:mpeg:dash:schema:mpd:2011" minBufferTime="PT1.500S" type="static" mediaPresentationDuration="PT0H0M23.992S" maxSegmentDuration="PT0H0M23.993S" profiles="urn:mpeg:dash:profile:full:2011">
<ProgramInformation moreInformationURL="http://gpac.io">
<Title>sample_dash.mpd generated by GPAC</Title>
</ProgramInformation>
<Period duration="PT0H0M23.992S">
<AdaptationSet segmentAlignment="true" maxWidth="1920" maxHeight="1080" maxFrameRate="96000/3199" par="16:9" lang="und" startWithSAP="1">
<InbandEventStream schemeIdUri="urn:mpeg:dash:event:2012" value="1"/>
<Representation id="1" mimeType="video/mp4" codecs="hev1.1.6.L150.0" width="1920" height="1080" frameRate="96000/3199" sar="1:1" bandwidth="3030916">
<BaseURL>sample_dashinit.mp4</BaseURL>
<SegmentList timescale="96000" duration="9600000">
<Initialization range="0-847"/>
<SegmentURL mediaRange="848-9097166" indexRange="848-891"/>
</SegmentList>
</Representation>
</AdaptationSet>
</Period>
</MPD>
```
**Environment Info**
```
MP4Box -version
MP4Box - GPAC version 1.1.0-DEV-rev1759-geb2d1e6dd-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
MINI build (encoders, decoders, audio and video output disabled)
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --static-mp4box
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_DISABLE_3D
```
| EMSG boxes are lost in fMP4 after MP4Box processing | https://api.github.com/repos/gpac/gpac/issues/2121/comments | 10 | 2022-02-17T08:16:27Z | 2022-02-21T12:25:09Z | https://github.com/gpac/gpac/issues/2121 | 1,141,008,215 | 2,121 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1759-geb2d1e6dd-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -frag 1 -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8079653/poc.zip)
## Crash output
```
==36294==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000014f5 at pc 0x0000007ed95d bp 0x7fff9dbe5110 sp 0x7fff9dbe5108
READ of size 1 at 0x6020000014f5 thread T0
#0 0x7ed95c in gf_isom_apple_enum_tag /programs/mp4box/builds/build15/src/isomedia/isom_read.c:4347:9
#1 0x1578ec6 in isor_declare_track /programs/mp4box/builds/build15/src/filters/isoffin_load.c:787:8
#2 0x1583b47 in isor_declare_objects /programs/mp4box/builds/build15/src/filters/isoffin_load.c:1453:3
#3 0xd05c0d in isoffin_initialize /programs/mp4box/builds/build15/src/filters/isoffin_read.c:485:8
#4 0xb74a43 in gf_filter_new_finalize /programs/mp4box/builds/build15/src/filter_core/filter.c:441:8
#5 0xb73120 in gf_filter_new /programs/mp4box/builds/build15/src/filter_core/filter.c:395:7
#6 0xb5e1bb in gf_fs_load_filter_internal /programs/mp4box/builds/build15/src/filter_core/filter_session.c:1293:13
#7 0x911528 in gf_media_fragment_file /programs/mp4box/builds/build15/src/media_tools/isom_tools.c:3789:6
#8 0x4e6fdc in mp4boxMain /programs/mp4box/builds/build15/applications/mp4box/main.c:6439:7
#9 0x7f7b5af220b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#10 0x41ea6d in _start (/programs/mp4box/builds/build15/bin/gcc/MP4Box+0x41ea6d)
0x6020000014f5 is located 0 bytes to the right of 5-byte region [0x6020000014f0,0x6020000014f5)
allocated by thread T0 here:
#0 0x499ccd in malloc (/programs/mp4box/builds/build15/bin/gcc/MP4Box+0x499ccd)
#1 0x12c648d in databox_box_read /programs/mp4box/builds/build15/src/isomedia/box_code_apple.c:247:22
#2 0x7ae1ed in gf_isom_box_read /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:1826:9
#3 0x7ae1ed in gf_isom_box_parse_ex /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:264:14
#4 0x12c53c3 in ilst_item_box_read /programs/mp4box/builds/build15/src/isomedia/box_code_apple.c:114:7
#5 0x7ae1ed in gf_isom_box_read /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:1826:9
#6 0x7ae1ed in gf_isom_box_parse_ex /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:264:14
#7 0x12c4d35 in ilst_box_read /programs/mp4box/builds/build15/src/isomedia/box_code_apple.c:47:8
#8 0x7ae1ed in gf_isom_box_read /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:1826:9
#9 0x7ae1ed in gf_isom_box_parse_ex /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:264:14
#10 0x7affe3 in gf_isom_box_array_read_ex /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:1719:7
#11 0x132290a in meta_box_read /programs/mp4box/builds/build15/src/isomedia/box_code_meta.c:106:13
#12 0x7ae1ed in gf_isom_box_read /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:1826:9
#13 0x7ae1ed in gf_isom_box_parse_ex /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:264:14
#14 0x7affe3 in gf_isom_box_array_read_ex /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:1719:7
#15 0x12f6245 in udta_box_read /programs/mp4box/builds/build15/src/isomedia/box_code_base.c:8075:13
#16 0x7ae1ed in gf_isom_box_read /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:1826:9
#17 0x7ae1ed in gf_isom_box_parse_ex /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:264:14
#18 0x7affe3 in gf_isom_box_array_read_ex /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:1719:7
#19 0x7ae1ed in gf_isom_box_read /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:1826:9
#20 0x7ae1ed in gf_isom_box_parse_ex /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:264:14
#21 0x7ad3c1 in gf_isom_parse_root_box /programs/mp4box/builds/build15/src/isomedia/box_funcs.c:38:8
#22 0x7c8dc1 in gf_isom_parse_movie_boxes_internal /programs/mp4box/builds/build15/src/isomedia/isom_intern.c:351:7
#23 0x7c8dc1 in gf_isom_parse_movie_boxes /programs/mp4box/builds/build15/src/isomedia/isom_intern.c:814:6
#24 0x7cd1a6 in gf_isom_open_file /programs/mp4box/builds/build15/src/isomedia/isom_intern.c:934:19
#25 0x4e14d6 in mp4boxMain /programs/mp4box/builds/build15/applications/mp4box/main.c:5968:12
#26 0x7f7b5af220b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow /programs/mp4box/builds/build15/src/isomedia/isom_read.c:4347:9 in gf_isom_apple_enum_tag
Shadow bytes around the buggy address:
0x0c047fff8240: fa fa fd fd fa fa fd fd fa fa fd fa fa fa 00 00
0x0c047fff8250: fa fa 00 00 fa fa 00 00 fa fa 00 04 fa fa 00 fa
0x0c047fff8260: fa fa 00 00 fa fa 00 00 fa fa 01 fa fa fa 00 00
0x0c047fff8270: fa fa 00 05 fa fa 00 00 fa fa 00 01 fa fa 00 00
0x0c047fff8280: fa fa 00 00 fa fa 02 fa fa fa 00 00 fa fa 00 02
=>0x0c047fff8290: fa fa 00 00 fa fa 00 04 fa fa 00 00 fa fa[05]fa
0x0c047fff82a0: fa fa 00 00 fa fa 02 fa fa fa 00 00 fa fa 00 fa
0x0c047fff82b0: fa fa 00 00 fa fa 00 00 fa fa 06 fa fa fa 00 00
0x0c047fff82c0: fa fa 02 fa fa fa 00 00 fa fa 02 fa fa fa 00 00
0x0c047fff82d0: fa fa 03 fa fa fa 00 00 fa fa 02 fa fa fa 00 00
0x0c047fff82e0: fa fa 00 00 fa fa 00 03 fa fa 00 00 fa fa 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==36294==ABORTING
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2120/comments | 0 | 2022-02-16T11:57:40Z | 2022-02-16T17:15:45Z | https://github.com/gpac/gpac/issues/2120 | 1,139,917,650 | 2,120 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
I use gpac to cut a mp4 file into ll-hls files and use nginx to serve them. gpac command I used is:
```shell
gpac -i ~/Videos/436256398-1-208.mp4 -o res/playlist.m3u8:gpac:segdur=6:cdur=1:profile=live:dmode=dynamic:rdirs=outdir:llhls=sf
```
I use https://www.theoplayer.com/ll-hls-test-page to verify ll-hls and find that the video is playing for 2~3s then it starts buffering infinitly. I use sample ll-hls test url and it can play normally and I believe that bandwidth is not bottleneck because I run nginx on `localhost`.
I try to build `gpac` by myself, also try to use latest nightly prebuilded version of `gpac` on [gpac official site](gpac.io) on Ubuntu 18.04, but this question still happpen. I want to know why and how to fix this question. | gpac generated ll-hls files cannot play normally | https://api.github.com/repos/gpac/gpac/issues/2119/comments | 6 | 2022-02-16T11:22:23Z | 2022-02-18T17:33:27Z | https://github.com/gpac/gpac/issues/2119 | 1,139,883,797 | 2,119 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1754-g5430ebe10-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -frag 0 -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8058607/poc.zip)
## Crash output
```
==22362==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000044d1 at pc 0x000000d840e7 bp 0x7fff514ddb70 sp 0x7fff514ddb68
READ of size 1 at 0x6020000044d1 thread T0
#0 0xd840e6 in mp4_mux_process_sample /programs/mp4box/builds/build14/src/filters/mux_isom.c
#1 0xd77e18 in mp4_mux_process_fragmented /programs/mp4box/builds/build14/src/filters/mux_isom.c:5650:8
#2 0xd7268f in mp4_mux_process /programs/mp4box/builds/build14/src/filters/mux_isom.c:6084:14
#3 0xb7ebc6 in gf_filter_process_task /programs/mp4box/builds/build14/src/filter_core/filter.c:2573:7
#4 0xb5f52e in gf_fs_thread_proc /programs/mp4box/builds/build14/src/filter_core/filter_session.c:1799:3
#5 0xb5e3d4 in gf_fs_run /programs/mp4box/builds/build14/src/filter_core/filter_session.c:2043:2
#6 0x911300 in gf_media_fragment_file /programs/mp4box/builds/build14/src/media_tools/isom_tools.c:3821:6
#7 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build14/applications/mp4box/main.c:6455:7
#8 0x7f18921c50b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#9 0x41ea6d in _start (/programs/mp4box/builds/build14/bin/gcc/MP4Box+0x41ea6d)
0x6020000044d1 is located 0 bytes to the right of 1-byte region [0x6020000044d0,0x6020000044d1)
allocated by thread T0 here:
#0 0x499ccd in malloc (/programs/mp4box/builds/build14/bin/gcc/MP4Box+0x499ccd)
#1 0x156602e in gf_filter_pck_new_alloc_internal /programs/mp4box/builds/build14/src/filter_core/filter_pck.c:151:15
#2 0xd09dad in isoffin_process /programs/mp4box/builds/build14/src/filters/isoffin_read.c:1343:12
#3 0xb7ebc6 in gf_filter_process_task /programs/mp4box/builds/build14/src/filter_core/filter.c:2573:7
#4 0xb5f52e in gf_fs_thread_proc /programs/mp4box/builds/build14/src/filter_core/filter_session.c:1799:3
#5 0xb5e3d4 in gf_fs_run /programs/mp4box/builds/build14/src/filter_core/filter_session.c:2043:2
#6 0x911300 in gf_media_fragment_file /programs/mp4box/builds/build14/src/media_tools/isom_tools.c:3821:6
#7 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build14/applications/mp4box/main.c:6455:7
#8 0x7f18921c50b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow /programs/mp4box/builds/build14/src/filters/mux_isom.c in mp4_mux_process_sample
Shadow bytes around the buggy address:
0x0c047fff8840: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8850: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa fd fa
0x0c047fff8860: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8870: fa fa 00 00 fa fa fd fa fa fa fd fd fa fa fd fa
0x0c047fff8880: fa fa fd fa fa fa fd fd fa fa fd fd fa fa 00 00
=>0x0c047fff8890: fa fa 00 00 fa fa 00 00 fa fa[01]fa fa fa 00 00
0x0c047fff88a0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa
0x0c047fff88b0: fa fa fd fd fa fa fd fd fa fa 00 00 fa fa 00 00
0x0c047fff88c0: fa fa fd fa fa fa 00 00 fa fa 00 03 fa fa 02 fa
0x0c047fff88d0: fa fa 02 fa fa fa 00 00 fa fa 00 00 fa fa fa fa
0x0c047fff88e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==22362==ABORTING
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2118/comments | 0 | 2022-02-14T07:11:09Z | 2022-02-15T09:42:56Z | https://github.com/gpac/gpac/issues/2118 | 1,136,871,446 | 2,118 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...).
Using the test command:
mp4box -itags copyright=TestString test.mp4
Then:
mp4box -info test.mp4
Shows existing but empty coypright tag. ffprobe can't see any copyright tag at all.
Trying to set the copyright tag again results in error message:
[iso file] Read Box type C-0000 (0x432D0000) at position 270566371 has size 0 but is not at root/file level !
[iso file] Box "cprt" (start 270566363) has 28 extra bytes | MP4Box copyright itag doesn't work | https://api.github.com/repos/gpac/gpac/issues/2117/comments | 1 | 2022-02-13T07:18:37Z | 2022-02-13T11:14:08Z | https://github.com/gpac/gpac/issues/2117 | 1,135,375,239 | 2,117 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1745-g9e1378706-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8039045/poc.zip)
## Crash output
```
==35757==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000001270 at pc 0x0000007d0889 bp 0x7fff1400a3d0 sp 0x7fff1400a3c8
READ of size 4 at 0x602000001270 thread T0
#0 0x7d0888 in convert_compact_sample_groups /programs/mp4box/builds/build13/src/isomedia/isom_intern.c:296:18
#1 0x7c9018 in gf_isom_parse_movie_boxes_internal /programs/mp4box/builds/build13/src/isomedia/isom_intern.c:420:7
#2 0x7c9018 in gf_isom_parse_movie_boxes /programs/mp4box/builds/build13/src/isomedia/isom_intern.c:812:6
#3 0x7ccf16 in gf_isom_open_file /programs/mp4box/builds/build13/src/isomedia/isom_intern.c:932:19
#4 0x4e14c6 in mp4boxMain /programs/mp4box/builds/build13/applications/mp4box/main.c:5984:12
#5 0x7fce38d730b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#6 0x41ea6d in _start (/programs/mp4box/builds/build13/bin/gcc/MP4Box+0x41ea6d)
0x602000001271 is located 0 bytes to the right of 1-byte region [0x602000001270,0x602000001271)
allocated by thread T0 here:
#0 0x499ccd in malloc (/programs/mp4box/builds/build13/bin/gcc/MP4Box+0x499ccd)
#1 0x1310c8e in csgp_box_read /programs/mp4box/builds/build13/src/isomedia/box_code_base.c:12613:55
#2 0x7adfad in gf_isom_box_read /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:1822:9
#3 0x7adfad in gf_isom_box_parse_ex /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:264:14
#4 0x7afda3 in gf_isom_box_array_read_ex /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:1719:7
#5 0x12e1c6b in stbl_box_read /programs/mp4box/builds/build13/src/isomedia/box_code_base.c:5069:6
#6 0x7adfad in gf_isom_box_read /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:1822:9
#7 0x7adfad in gf_isom_box_parse_ex /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:264:14
#8 0x7afda3 in gf_isom_box_array_read_ex /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:1719:7
#9 0x12d7132 in minf_box_read /programs/mp4box/builds/build13/src/isomedia/box_code_base.c:3549:6
#10 0x7adfad in gf_isom_box_read /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:1822:9
#11 0x7adfad in gf_isom_box_parse_ex /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:264:14
#12 0x7afda3 in gf_isom_box_array_read_ex /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:1719:7
#13 0x12d4665 in mdia_box_read /programs/mp4box/builds/build13/src/isomedia/box_code_base.c:3100:6
#14 0x7adfad in gf_isom_box_read /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:1822:9
#15 0x7adfad in gf_isom_box_parse_ex /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:264:14
#16 0x7afda3 in gf_isom_box_array_read_ex /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:1719:7
#17 0x12ec620 in trak_box_read /programs/mp4box/builds/build13/src/isomedia/box_code_base.c:6844:6
#18 0x7adfad in gf_isom_box_read /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:1822:9
#19 0x7adfad in gf_isom_box_parse_ex /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:264:14
#20 0x7afda3 in gf_isom_box_array_read_ex /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:1719:7
#21 0x7adfad in gf_isom_box_read /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:1822:9
#22 0x7adfad in gf_isom_box_parse_ex /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:264:14
#23 0x7ad181 in gf_isom_parse_root_box /programs/mp4box/builds/build13/src/isomedia/box_funcs.c:38:8
#24 0x7c8b31 in gf_isom_parse_movie_boxes_internal /programs/mp4box/builds/build13/src/isomedia/isom_intern.c:349:7
#25 0x7c8b31 in gf_isom_parse_movie_boxes /programs/mp4box/builds/build13/src/isomedia/isom_intern.c:812:6
#26 0x7ccf16 in gf_isom_open_file /programs/mp4box/builds/build13/src/isomedia/isom_intern.c:932:19
#27 0x4e14c6 in mp4boxMain /programs/mp4box/builds/build13/applications/mp4box/main.c:5984:12
#28 0x7fce38d730b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow /programs/mp4box/builds/build13/src/isomedia/isom_intern.c:296:18 in convert_compact_sample_groups
Shadow bytes around the buggy address:
0x0c047fff81f0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8200: fa fa 00 05 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8210: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 01 fa
0x0c047fff8220: fa fa fd fa fa fa fd fd fa fa 00 00 fa fa 00 00
0x0c047fff8230: fa fa 01 fa fa fa 01 fa fa fa 01 fa fa fa 01 fa
=>0x0c047fff8240: fa fa 01 fa fa fa 01 fa fa fa 01 fa fa fa[01]fa
0x0c047fff8250: fa fa 01 fa fa fa 01 fa fa fa 01 fa fa fa 01 fa
0x0c047fff8260: fa fa 01 fa fa fa 01 fa fa fa 01 fa fa fa 01 fa
0x0c047fff8270: fa fa 01 fa fa fa 01 fa fa fa 01 fa fa fa 01 fa
0x0c047fff8280: fa fa 01 fa fa fa 01 fa fa fa 01 fa fa fa 00 04
0x0c047fff8290: fa fa 01 fa fa fa 01 fa fa fa 01 fa fa fa 01 fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==35757==ABORTING
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2116/comments | 0 | 2022-02-10T07:49:52Z | 2022-02-10T20:00:56Z | https://github.com/gpac/gpac/issues/2116 | 1,129,589,949 | 2,116 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1745-g9e1378706-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -frag 1 -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8039034/poc.zip)
## Crash output
```
==13990==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000002488 at pc 0x000000d7f77d bp 0x7ffe1efb95d0 sp 0x7ffe1efb95c8
READ of size 1 at 0x603000002488 thread T0
#0 0xd7f77c in mp4_mux_cenc_update /programs/mp4box/builds/build13/src/filters/mux_isom.c:3762:15
#1 0xd82649 in mp4_mux_process_sample /programs/mp4box/builds/build13/src/filters/mux_isom.c:4147:8
#2 0xd76b18 in mp4_mux_process_fragmented /programs/mp4box/builds/build13/src/filters/mux_isom.c:5650:8
#3 0xd7138f in mp4_mux_process /programs/mp4box/builds/build13/src/filters/mux_isom.c:6084:14
#4 0xb7e4b6 in gf_filter_process_task /programs/mp4box/builds/build13/src/filter_core/filter.c:2563:7
#5 0xb5ef3e in gf_fs_thread_proc /programs/mp4box/builds/build13/src/filter_core/filter_session.c:1799:3
#6 0xb5dde4 in gf_fs_run /programs/mp4box/builds/build13/src/filter_core/filter_session.c:2043:2
#7 0x911280 in gf_media_fragment_file /programs/mp4box/builds/build13/src/media_tools/isom_tools.c:3821:6
#8 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build13/applications/mp4box/main.c:6455:7
#9 0x7f33c6f470b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#10 0x41ea6d in _start (/programs/mp4box/builds/build13/bin/gcc/MP4Box+0x41ea6d)
0x603000002488 is located 0 bytes to the right of 24-byte region [0x603000002470,0x603000002488)
allocated by thread T0 here:
#0 0x499fe9 in realloc (/programs/mp4box/builds/build13/bin/gcc/MP4Box+0x499fe9)
#1 0xb51ad1 in gf_props_assign_value /programs/mp4box/builds/build13/src/filter_core/filter_props.c:960:32
#2 0xb51ad1 in gf_props_insert_property /programs/mp4box/builds/build13/src/filter_core/filter_props.c:1031:2
#3 0xd0907e in isoffin_process /programs/mp4box/builds/build13/src/filters/isoffin_read.c:1397:6
#4 0xb7e4b6 in gf_filter_process_task /programs/mp4box/builds/build13/src/filter_core/filter.c:2563:7
#5 0xb5ef3e in gf_fs_thread_proc /programs/mp4box/builds/build13/src/filter_core/filter_session.c:1799:3
#6 0xb5dde4 in gf_fs_run /programs/mp4box/builds/build13/src/filter_core/filter_session.c:2043:2
#7 0x911280 in gf_media_fragment_file /programs/mp4box/builds/build13/src/media_tools/isom_tools.c:3821:6
#8 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build13/applications/mp4box/main.c:6455:7
#9 0x7f33c6f470b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow /programs/mp4box/builds/build13/src/filters/mux_isom.c:3762:15 in mp4_mux_cenc_update
Shadow bytes around the buggy address:
0x0c067fff8440: 00 00 00 fa fa fa fd fd fd fa fa fa fd fd fd fd
0x0c067fff8450: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00
0x0c067fff8460: 00 00 fa fa 00 00 00 fa fa fa fd fd fd fa fa fa
0x0c067fff8470: 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 00 fa
0x0c067fff8480: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00
=>0x0c067fff8490: 00[fa]fa fa fd fd fd fa fa fa fd fd fd fa fa fa
0x0c067fff84a0: fd fd fd fd fa fa 00 00 00 fa fa fa 00 00 00 fa
0x0c067fff84b0: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00
0x0c067fff84c0: 00 fa fa fa fd fd fd fd fa fa fd fd fd fd fa fa
0x0c067fff84d0: 00 00 00 fa fa fa fd fd fd fa fa fa fd fd fd fd
0x0c067fff84e0: fa fa fd fd fd fa fa fa fd fd fd fd fa fa fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==13990==ABORTING
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2115/comments | 0 | 2022-02-10T07:48:44Z | 2022-02-10T20:00:55Z | https://github.com/gpac/gpac/issues/2115 | 1,129,588,900 | 2,115 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1745-g9e1378706-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -frag 0 -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8039023/poc.zip)
## Crash output
```
==26783==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000019f1 at pc 0x000000430bd6 bp 0x7ffd20148550 sp 0x7ffd20147d10
READ of size 2 at 0x6020000019f1 thread T0
#0 0x430bd5 in strlen (/programs/mp4box/builds/build13/bin/gcc/MP4Box+0x430bd5)
#1 0xd933ac in mp4_mux_set_udta /programs/mp4box/builds/build13/src/filters/mux_isom.c:756:18
#2 0xd933ac in mp4_mux_setup_pid /programs/mp4box/builds/build13/src/filters/mux_isom.c:3342:3
#3 0xb16b42 in gf_filter_pid_configure /programs/mp4box/builds/build13/src/filter_core/filter_pid.c:752:6
#4 0xb2b9c6 in gf_filter_pid_connect_task /programs/mp4box/builds/build13/src/filter_core/filter_pid.c:1061:3
#5 0xb5ef3e in gf_fs_thread_proc /programs/mp4box/builds/build13/src/filter_core/filter_session.c:1799:3
#6 0xb5dde4 in gf_fs_run /programs/mp4box/builds/build13/src/filter_core/filter_session.c:2043:2
#7 0x911280 in gf_media_fragment_file /programs/mp4box/builds/build13/src/media_tools/isom_tools.c:3821:6
#8 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build13/applications/mp4box/main.c:6455:7
#9 0x7f166462d0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#10 0x41ea6d in _start (/programs/mp4box/builds/build13/bin/gcc/MP4Box+0x41ea6d)
0x6020000019f1 is located 0 bytes to the right of 1-byte region [0x6020000019f0,0x6020000019f1)
allocated by thread T0 here:
#0 0x499ccd in malloc (/programs/mp4box/builds/build13/bin/gcc/MP4Box+0x499ccd)
#1 0x7e0750 in gf_isom_get_user_data /programs/mp4box/builds/build13/src/isomedia/isom_read.c:2724:24
#2 0x1577520 in isor_declare_track /programs/mp4box/builds/build13/src/filters/isoffin_load.c:889:7
#3 0x1580b67 in isor_declare_objects /programs/mp4box/builds/build13/src/filters/isoffin_load.c:1453:3
#4 0xd0347d in isoffin_initialize /programs/mp4box/builds/build13/src/filters/isoffin_read.c:485:8
#5 0xb730a3 in gf_filter_new_finalize /programs/mp4box/builds/build13/src/filter_core/filter.c:431:8
#6 0xb7186c in gf_filter_new /programs/mp4box/builds/build13/src/filter_core/filter.c:385:7
#7 0xb5d4fb in gf_fs_load_filter_internal /programs/mp4box/builds/build13/src/filter_core/filter_session.c:1293:13
#8 0x9111c8 in gf_media_fragment_file /programs/mp4box/builds/build13/src/media_tools/isom_tools.c:3789:6
#9 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build13/applications/mp4box/main.c:6455:7
#10 0x7f166462d0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/programs/mp4box/builds/build13/bin/gcc/MP4Box+0x430bd5) in strlen
Shadow bytes around the buggy address:
0x0c047fff82e0: fa fa 00 00 fa fa 00 00 fa fa 07 fa fa fa 00 00
0x0c047fff82f0: fa fa 00 00 fa fa 04 fa fa fa 00 00 fa fa fd fd
0x0c047fff8300: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff8310: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 05 fa
0x0c047fff8320: fa fa 00 00 fa fa 00 00 fa fa 00 fa fa fa fd fd
=>0x0c047fff8330: fa fa fd fd fa fa 00 03 fa fa 00 02 fa fa[01]fa
0x0c047fff8340: fa fa 00 02 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8350: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8360: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8370: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8380: fa fa 00 01 fa fa 02 fa fa fa 00 00 fa fa 06 fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==26783==ABORTING
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2114/comments | 0 | 2022-02-10T07:47:25Z | 2022-02-10T20:00:55Z | https://github.com/gpac/gpac/issues/2114 | 1,129,587,702 | 2,114 |
[
"gpac",
"gpac"
] | ## Description
There is a segment fault detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1740-gbd98129fd-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -flat -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8032708/poc.zip)
## Crash output
```
==30676==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000040 (pc 0x0000007f9b6b bp 0x7ffd0126e890 sp 0x7ffd0126c600 T0)
==30676==The signal is caused by a READ memory access.
==30676==Hint: address points to the zero page.
#0 0x7f9b6b in DoWriteMeta /programs/mp4box/builds/build12/src/isomedia/isom_store.c:763:13
#1 0x7faf65 in DoWrite /programs/mp4box/builds/build12/src/isomedia/isom_store.c:928:8
#2 0x802ec2 in WriteFlat /programs/mp4box/builds/build12/src/isomedia/isom_store.c:1170:10
#3 0x800b2a in WriteToFile /programs/mp4box/builds/build12/src/isomedia/isom_store.c
#4 0x7d3607 in gf_isom_write /programs/mp4box/builds/build12/src/isomedia/isom_read.c:600:8
#5 0x7d3bd3 in gf_isom_close /programs/mp4box/builds/build12/src/isomedia/isom_read.c:624:6
#6 0x4e765f in mp4boxMain /programs/mp4box/builds/build12/applications/mp4box/main.c:6547:7
#7 0x7fd809faf0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#8 0x41ea6d in _start (/programs/mp4box/builds/build12/bin/gcc/MP4Box+0x41ea6d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /programs/mp4box/builds/build12/src/isomedia/isom_store.c:763:13 in DoWriteMeta
==30676==ABORTING
``` | There is a segment fault detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2113/comments | 0 | 2022-02-09T12:36:07Z | 2022-02-09T14:54:34Z | https://github.com/gpac/gpac/issues/2113 | 1,128,487,015 | 2,113 |
[
"gpac",
"gpac"
] | ## Description
There is a segment fault detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1740-gbd98129fd-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8032697/poc.zip)
## Crash output
```
==35942==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000002c (pc 0x0000007c72df bp 0x7ffd62baabf0 sp 0x7ffd62baa9e0 T0)
==35942==The signal is caused by a READ memory access.
==35942==Hint: address points to the zero page.
#0 0x7c72df in MergeFragment /programs/mp4box/builds/build12/src/isomedia/isom_intern.c
#1 0x7cb3c4 in gf_isom_parse_movie_boxes_internal /programs/mp4box/builds/build12/src/isomedia/isom_intern.c:681:9
#2 0x7cb3c4 in gf_isom_parse_movie_boxes /programs/mp4box/builds/build12/src/isomedia/isom_intern.c:812:6
#3 0x7ccef6 in gf_isom_open_file /programs/mp4box/builds/build12/src/isomedia/isom_intern.c:932:19
#4 0x4ebd9f in dump_isom_scene_stats /programs/mp4box/builds/build12/applications/mp4box/filedump.c:378:15
#5 0x4e0c2a in mp4boxMain /programs/mp4box/builds/build12/applications/mp4box/main.c:6152:18
#6 0x7fc1740af0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#7 0x41ea6d in _start (/programs/mp4box/builds/build12/bin/gcc/MP4Box+0x41ea6d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /programs/mp4box/builds/build12/src/isomedia/isom_intern.c in MergeFragment
==35942==ABORTING
``` | There is a segment fault detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2112/comments | 0 | 2022-02-09T12:34:45Z | 2022-02-09T14:54:34Z | https://github.com/gpac/gpac/issues/2112 | 1,128,485,645 | 2,112 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1740-gbd98129fd-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -dxml -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8032689/poc.zip)
## Crash output
```
==18782==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6160000005a8 at pc 0x00000043c838 bp 0x7ffdafbe3de0 sp 0x7ffdafbe3560
READ of size 257 at 0x6160000005a8 thread T0
#0 0x43c837 in printf_common(void*, char const*, __va_list_tag*) (/programs/mp4box/builds/build12/bin/gcc/MP4Box+0x43c837)
#1 0x53d900 in gf_fprintf /programs/mp4box/builds/build12/src/utils/os_file.c:1620:9
#2 0x7a91bd in bloc_box_dump /programs/mp4box/builds/build12/src/isomedia/box_dump.c:5936:2
#3 0x7b2fcb in gf_isom_box_dump /programs/mp4box/builds/build12/src/isomedia/box_funcs.c:2065:2
#4 0x782dba in gf_isom_dump /programs/mp4box/builds/build12/src/isomedia/box_dump.c:135:3
#5 0x4f7f0c in dump_isom_xml /programs/mp4box/builds/build12/applications/mp4box/filedump.c:1954:6
#6 0x4e0da8 in mp4boxMain /programs/mp4box/builds/build12/applications/mp4box/main.c:6171:7
#7 0x7fecebfe50b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#8 0x41ea6d in _start (/programs/mp4box/builds/build12/bin/gcc/MP4Box+0x41ea6d)
0x6160000005a8 is located 0 bytes to the right of 552-byte region [0x616000000380,0x6160000005a8)
allocated by thread T0 here:
#0 0x499ccd in malloc (/programs/mp4box/builds/build12/bin/gcc/MP4Box+0x499ccd)
#1 0x1308bcf in bloc_box_new /programs/mp4box/builds/build12/src/isomedia/box_code_base.c:11496:2
#2 0x7af501 in gf_isom_box_new_ex /programs/mp4box/builds/build12/src/isomedia/box_funcs.c:1685:6
#3 0x7ad82d in gf_isom_box_parse_ex /programs/mp4box/builds/build12/src/isomedia/box_funcs.c:240:12
#4 0x7ad181 in gf_isom_parse_root_box /programs/mp4box/builds/build12/src/isomedia/box_funcs.c:38:8
#5 0x7c8b11 in gf_isom_parse_movie_boxes_internal /programs/mp4box/builds/build12/src/isomedia/isom_intern.c:349:7
#6 0x7c8b11 in gf_isom_parse_movie_boxes /programs/mp4box/builds/build12/src/isomedia/isom_intern.c:812:6
#7 0x7ccef6 in gf_isom_open_file /programs/mp4box/builds/build12/src/isomedia/isom_intern.c:932:19
#8 0x4e14c6 in mp4boxMain /programs/mp4box/builds/build12/applications/mp4box/main.c:5984:12
#9 0x7fecebfe50b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/programs/mp4box/builds/build12/bin/gcc/MP4Box+0x43c837) in printf_common(void*, char const*, __va_list_tag*)
Shadow bytes around the buggy address:
0x0c2c7fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2c7fff8070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2c7fff8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2c7fff8090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2c7fff80a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c2c7fff80b0: 00 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa
0x0c2c7fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2c7fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2c7fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2c7fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2c7fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==18782==ABORTING
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2111/comments | 0 | 2022-02-09T12:33:29Z | 2022-02-09T14:54:34Z | https://github.com/gpac/gpac/issues/2111 | 1,128,484,064 | 2,111 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1740-gbd98129fd-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -frag 0 -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8032679/poc.zip)
## Crash output
```
==8316==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000001b28 at pc 0x000000d7f7c2 bp 0x7ffce5ee42f0 sp 0x7ffce5ee42e8
READ of size 1 at 0x603000001b28 thread T0
#0 0xd7f7c1 in mp4_mux_cenc_update /programs/mp4box/builds/build12/src/filters/mux_isom.c:3764:12
#1 0xd82679 in mp4_mux_process_sample /programs/mp4box/builds/build12/src/filters/mux_isom.c:4143:8
#2 0xd76b58 in mp4_mux_process_fragmented /programs/mp4box/builds/build12/src/filters/mux_isom.c:5646:8
#3 0xd713cf in mp4_mux_process /programs/mp4box/builds/build12/src/filters/mux_isom.c:6080:14
#4 0xb7e4f6 in gf_filter_process_task /programs/mp4box/builds/build12/src/filter_core/filter.c:2563:7
#5 0xb5ef7e in gf_fs_thread_proc /programs/mp4box/builds/build12/src/filter_core/filter_session.c:1799:3
#6 0xb5de24 in gf_fs_run /programs/mp4box/builds/build12/src/filter_core/filter_session.c:2043:2
#7 0x9112c0 in gf_media_fragment_file /programs/mp4box/builds/build12/src/media_tools/isom_tools.c:3821:6
#8 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build12/applications/mp4box/main.c:6455:7
#9 0x7fa7f5b990b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#10 0x41ea6d in _start (/programs/mp4box/builds/build12/bin/gcc/MP4Box+0x41ea6d)
0x603000001b28 is located 0 bytes to the right of 24-byte region [0x603000001b10,0x603000001b28)
allocated by thread T0 here:
#0 0x499fe9 in realloc (/programs/mp4box/builds/build12/bin/gcc/MP4Box+0x499fe9)
#1 0xb51b11 in gf_props_assign_value /programs/mp4box/builds/build12/src/filter_core/filter_props.c:960:32
#2 0xb51b11 in gf_props_insert_property /programs/mp4box/builds/build12/src/filter_core/filter_props.c:1031:2
#3 0xd090be in isoffin_process /programs/mp4box/builds/build12/src/filters/isoffin_read.c:1397:6
#4 0xb7e4f6 in gf_filter_process_task /programs/mp4box/builds/build12/src/filter_core/filter.c:2563:7
#5 0xb5ef7e in gf_fs_thread_proc /programs/mp4box/builds/build12/src/filter_core/filter_session.c:1799:3
#6 0xb5de24 in gf_fs_run /programs/mp4box/builds/build12/src/filter_core/filter_session.c:2043:2
#7 0x9112c0 in gf_media_fragment_file /programs/mp4box/builds/build12/src/media_tools/isom_tools.c:3821:6
#8 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build12/applications/mp4box/main.c:6455:7
#9 0x7fa7f5b990b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow /programs/mp4box/builds/build12/src/filters/mux_isom.c:3764:12 in mp4_mux_cenc_update
Shadow bytes around the buggy address:
0x0c067fff8310: 00 00 fa fa 00 00 00 06 fa fa fd fd fd fa fa fa
0x0c067fff8320: 00 00 00 fa fa fa fd fd fd fa fa fa fd fd fd fd
0x0c067fff8330: fa fa 00 00 00 00 fa fa 00 00 00 fa fa fa 00 00
0x0c067fff8340: 00 fa fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa
0x0c067fff8350: 00 00 00 fa fa fa fd fd fd fa fa fa fd fd fd fd
=>0x0c067fff8360: fa fa 00 00 00[fa]fa fa fd fd fd fa fa fa fd fd
0x0c067fff8370: fd fd fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa
0x0c067fff8380: 00 00 00 fa fa fa 00 00 00 00 fa fa 00 00 00 fa
0x0c067fff8390: fa fa fd fd fd fa fa fa fd fd fd fd fa fa 00 00
0x0c067fff83a0: 00 00 fa fa 00 00 00 fa fa fa fd fd fd fa fa fa
0x0c067fff83b0: fd fd fd fd fa fa 00 00 00 fa fa fa 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==8316==ABORTING
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2110/comments | 0 | 2022-02-09T12:32:23Z | 2022-02-09T14:54:34Z | https://github.com/gpac/gpac/issues/2110 | 1,128,482,583 | 2,110 |
[
"gpac",
"gpac"
] | ## Description
There is a use-after-free detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1727-g8be34973d-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -lsr -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8020762/poc.zip)
## Crash output
```
==28733==ERROR: AddressSanitizer: heap-use-after-free on address 0x603000002bc0 at pc 0x000000721f36 bp 0x7ffec8945940 sp 0x7ffec8945938
READ of size 2 at 0x603000002bc0 thread T0
#0 0x721f35 in gf_node_get_attribute_by_tag/programs/mp4box/builds/build10/src/scenegraph/xml_ns.c:934:18
#1 0x70ca13 in gf_dom_listener_del/programs/mp4box/builds/build10/src/scenegraph/dom_events.c:161:6
#2 0x70ccaa in gf_dom_event_remove_all_listeners/programs/mp4box/builds/build10/src/scenegraph/dom_events.c:196:3
#3 0x5c54f5 in gf_node_free/programs/mp4box/builds/build10/src/scenegraph/base_scenegraph.c:1601:4
#4 0x6dac25 in gf_svg_node_del/programs/mp4box/builds/build10/src/scenegraph/svg_types.c:126:2
#5 0x5bf0f1 in gf_node_unregister/programs/mp4box/builds/build10/src/scenegraph/base_scenegraph.c:761:3
#6 0x5bfb17 in gf_sg_reset/programs/mp4box/builds/build10/src/scenegraph/base_scenegraph.c:479:3
#7 0x5be86d in gf_sg_del/programs/mp4box/builds/build10/src/scenegraph/base_scenegraph.c:162:2
#8 0x4eba5d in dump_isom_scene/programs/mp4box/builds/build10/applications/mp4box/filedump.c:221:2
#9 0x4e0bda in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:6146:7
#10 0x7f9d3ecb80b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#11 0x41ea6d in _start (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x41ea6d)
0x603000002bc0 is located 0 bytes inside of 24-byte region [0x603000002bc0,0x603000002bd8)
freed by thread T0 here:
#0 0x499a62 in free (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x499a62)
#1 0x7215a7 in gf_node_delete_attributes/programs/mp4box/builds/build10/src/scenegraph/xml_ns.c:728:3
#2 0x6dac15 in gf_svg_node_del/programs/mp4box/builds/build10/src/scenegraph/svg_types.c:124:2
#3 0x5bf0f1 in gf_node_unregister/programs/mp4box/builds/build10/src/scenegraph/base_scenegraph.c:761:3
#4 0x5bfb17 in gf_sg_reset/programs/mp4box/builds/build10/src/scenegraph/base_scenegraph.c:479:3
#5 0x5be86d in gf_sg_del/programs/mp4box/builds/build10/src/scenegraph/base_scenegraph.c:162:2
#6 0x4eba5d in dump_isom_scene/programs/mp4box/builds/build10/applications/mp4box/filedump.c:221:2
#7 0x4e0bda in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:6146:7
#8 0x7f9d3ecb80b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
previously allocated by thread T0 here:
#0 0x499ccd in malloc (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x499ccd)
#1 0x72217c in gf_node_create_attribute_from_datatype/programs/mp4box/builds/build10/src/scenegraph/xml_ns.c:737:2
#2 0x72217c in gf_xml_create_attribute/programs/mp4box/builds/build10/src/scenegraph/xml_ns.c:541:9
#3 0x72217c in gf_node_get_attribute_by_tag/programs/mp4box/builds/build10/src/scenegraph/xml_ns.c:946:9
#4 0xaf1c3f in lsr_read_rare_full/programs/mp4box/builds/build10/src/laser/lsr_dec.c:1446:21
#5 0xaf01c7 in lsr_read_listener/programs/mp4box/builds/build10/src/laser/lsr_dec.c:4355:2
#6 0xb00747 in lsr_read_scene_content_model/programs/mp4box/builds/build10/src/laser/lsr_dec.c:4600:7
#7 0xaff8a0 in lsr_read_group_content/programs/mp4box/builds/build10/src/laser/lsr_dec.c:4785:8
#8 0xaeb4d9 in lsr_read_rectClip/programs/mp4box/builds/build10/src/laser/lsr_dec.c:3987:2
#9 0xb00752 in lsr_read_scene_content_model/programs/mp4box/builds/build10/src/laser/lsr_dec.c:4519:7
#10 0xaff8a0 in lsr_read_group_content/programs/mp4box/builds/build10/src/laser/lsr_dec.c:4785:8
#11 0xae55a4 in lsr_read_svg/programs/mp4box/builds/build10/src/laser/lsr_dec.c:4192:2
#12 0xadf7ae in lsr_read_command_list/programs/mp4box/builds/build10/src/laser/lsr_dec.c:5886:9
#13 0xaddbfb in lsr_decode_laser_unit/programs/mp4box/builds/build10/src/laser/lsr_dec.c:6133:6
#14 0xade67f in gf_laser_decode_command_list/programs/mp4box/builds/build10/src/laser/lsr_dec.c:230:6
#15 0xa356af in gf_sm_load_run_isom/programs/mp4box/builds/build10/src/scene_manager/loader_isom.c:307:10
#16 0x4eb9a1 in dump_isom_scene/programs/mp4box/builds/build10/applications/mp4box/filedump.c:203:14
#17 0x4e0bda in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:6146:7
#18 0x7f9d3ecb80b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-use-after-free/programs/mp4box/builds/build10/src/scenegraph/xml_ns.c:934:18 in gf_node_get_attribute_by_tag
Shadow bytes around the buggy address:
0x0c067fff8520: fd fa fa fa fd fd fd fa fa fa fd fd fd fa fa fa
0x0c067fff8530: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd fa
0x0c067fff8540: fa fa fd fd fd fa fa fa fd fd fd fd fa fa fd fd
0x0c067fff8550: fd fa fa fa fd fd fd fa fa fa fd fd fd fd fa fa
0x0c067fff8560: fd fd fd fa fa fa fd fd fd fa fa fa 00 00 00 fa
=>0x0c067fff8570: fa fa fd fd fd fd fa fa[fd]fd fd fa fa fa fd fd
0x0c067fff8580: fd fd fa fa fd fd fd fa fa fa fd fd fd fa fa fa
0x0c067fff8590: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd fa
0x0c067fff85a0: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd
0x0c067fff85b0: fd fa fa fa fd fd fd fa fa fa fd fd fd fa fa fa
0x0c067fff85c0: fd fd fd fa fa fa fd fd fd fd fa fa fd fd fd fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==28733==ABORTING
``` | There is a use-after-free detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2109/comments | 0 | 2022-02-08T04:23:02Z | 2022-02-08T15:23:20Z | https://github.com/gpac/gpac/issues/2109 | 1,126,777,303 | 2,109 |
[
"gpac",
"gpac"
] | ## Description
There is a statck-overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1727-g8be34973d-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -frag 0 -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8020756/poc.zip)
## Crash output
```
==5882==ERROR: AddressSanitizer: stack-overflow on address 0x7fff020baff8 (pc 0x0000007cd878 bp 0x7fff020bb0c0 sp 0x7fff020bb000 T0)
#0 0x7cd878 in GetMediaTime/programs/mp4box/builds/build10/src/isomedia/isom_intern.c:1108:8
#1 0x7de0a0 in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c:2311:6
#2 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#3 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#4 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#5 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#6 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#7 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#8 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#9 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#10 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#11 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#12 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#13 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#14 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#15 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#16 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#17 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#18 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#19 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#20 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#21 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#22 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#23 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#24 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#25 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#26 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#27 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#28 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#29 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#30 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#31 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#32 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#33 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#34 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#35 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#36 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#37 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#38 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#39 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#40 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#41 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#42 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#43 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#44 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#45 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#46 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#47 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#48 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#49 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#50 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#51 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#52 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#53 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#54 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#55 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#56 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#57 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#58 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#59 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#60 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#61 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#62 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#63 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#64 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#65 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#66 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#67 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#68 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#69 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#70 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#71 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#72 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#73 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#74 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#75 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#76 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#77 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#78 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#79 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#80 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#81 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#82 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#83 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#84 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#85 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#86 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#87 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#88 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#89 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#90 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#91 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#92 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#93 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#94 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#95 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#96 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#97 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#98 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#99 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#100 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#101 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#102 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#103 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#104 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#105 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#106 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#107 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#108 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#109 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#110 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#111 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#112 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#113 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#114 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#115 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#116 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#117 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#118 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#119 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#120 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#121 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#122 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#123 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#124 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#125 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#126 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#127 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#128 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#129 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#130 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#131 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#132 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#133 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#134 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#135 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#136 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#137 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#138 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#139 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#140 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#141 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#142 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#143 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#144 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#145 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#146 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#147 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#148 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#149 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#150 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#151 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#152 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#153 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#154 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#155 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#156 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#157 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#158 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#159 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#160 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#161 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#162 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#163 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#164 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#165 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#166 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#167 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#168 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#169 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#170 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#171 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#172 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#173 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#174 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#175 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#176 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#177 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#178 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#179 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#180 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#181 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#182 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#183 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#184 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#185 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#186 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#187 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#188 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#189 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#190 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#191 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#192 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#193 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#194 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#195 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#196 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#197 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#198 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#199 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#200 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#201 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#202 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#203 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#204 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#205 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#206 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#207 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#208 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#209 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#210 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#211 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#212 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#213 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#214 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#215 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#216 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#217 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#218 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#219 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#220 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#221 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#222 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#223 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#224 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#225 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#226 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#227 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#228 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#229 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#230 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#231 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#232 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#233 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#234 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#235 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#236 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#237 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#238 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#239 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#240 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#241 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#242 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#243 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#244 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#245 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#246 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#247 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
#248 0x7de76e in gf_isom_get_sample_for_movie_time/programs/mp4box/builds/build10/src/isomedia/isom_read.c
SUMMARY: AddressSanitizer: stack-overflow/programs/mp4box/builds/build10/src/isomedia/isom_intern.c:1108:8 in GetMediaTime
==5882==ABORTING
``` | There is a statck-overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2108/comments | 0 | 2022-02-08T04:22:07Z | 2022-02-08T15:23:20Z | https://github.com/gpac/gpac/issues/2108 | 1,126,776,763 | 2,108 |
[
"gpac",
"gpac"
] | ## Description
There is a segment fault detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1727-g8be34973d-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -isma -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8020744/poc.zip)
## Crash output
```
==7355==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000004 (pc 0x0000008f9bfe bp 0x7ffea000f9f0 sp 0x7ffea000f600 T0)
==7355==The signal is caused by a READ memory access.
==7355==Hint: address points to the zero page.
#0 0x8f9bfe in gf_media_make_isma/programs/mp4box/builds/build10/src/media_tools/isom_tools.c:445:37
#1 0x4e4934 in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:6332:8
#2 0x7f224ff820b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#3 0x41ea6d in _start (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x41ea6d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV/programs/mp4box/builds/build10/src/media_tools/isom_tools.c:445:37 in gf_media_make_isma
==7355==ABORTING
``` | There is a segment fault detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2107/comments | 0 | 2022-02-08T04:20:13Z | 2022-02-08T15:23:19Z | https://github.com/gpac/gpac/issues/2107 | 1,126,775,651 | 2,107 |
[
"gpac",
"gpac"
] | ## Description
There is a segment fault detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1727-g8be34973d-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -dmp4 -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8020734/poc.zip)
## Crash output
```
==898==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000005b875b bp 0x7fff1f6fc650 sp 0x7fff1f6fc650 T0)
==898==The signal is caused by a READ memory access.
==898==Hint: address points to the zero page.
#0 0x5b875b in gf_utf8_wcslen/programs/mp4box/builds/build10/src/utils/utf.c:441:21
#1 0x7ac4c4 in xtra_box_dump/programs/mp4box/builds/build10/src/isomedia/box_dump.c:6306:40
#2 0x7b2d7b in gf_isom_box_dump/programs/mp4box/builds/build10/src/isomedia/box_funcs.c:2065:2
#3 0x782c5a in gf_isom_dump/programs/mp4box/builds/build10/src/isomedia/box_dump.c:135:3
#4 0x4f7e9c in dump_isom_xml/programs/mp4box/builds/build10/applications/mp4box/filedump.c:1950:6
#5 0x4e0da8 in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:6171:7
#6 0x7f16b0fc20b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#7 0x41ea6d in _start (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x41ea6d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV/programs/mp4box/builds/build10/src/utils/utf.c:441:21 in gf_utf8_wcslen
==898==ABORTING
``` | There is a segment fault detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2106/comments | 0 | 2022-02-08T04:18:47Z | 2022-02-08T15:23:19Z | https://github.com/gpac/gpac/issues/2106 | 1,126,774,793 | 2,106 |
[
"gpac",
"gpac"
] | ## Description
There is a segment fault detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1727-g8be34973d-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -frag 0 -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8020724/poc.zip)
## Crash output
```
==18741==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000010 (pc 0x000000d0c39d bp 0x7ffe59676990 sp 0x7ffe59676820 T0)
==18741==The signal is caused by a WRITE memory access.
==18741==Hint: address points to the zero page.
#0 0xd0c39d in isor_reader_get_sample/programs/mp4box/builds/build10/src/filters/isoffin_read_ch.c:367:22
#1 0xd04498 in isoffin_process/programs/mp4box/builds/build10/src/filters/isoffin_read.c:1311:5
#2 0xb7d866 in gf_filter_process_task/programs/mp4box/builds/build10/src/filter_core/filter.c:2555:7
#3 0xb5e41b in gf_fs_thread_proc/programs/mp4box/builds/build10/src/filter_core/filter_session.c:1793:3
#4 0xb5d2c4 in gf_fs_run/programs/mp4box/builds/build10/src/filter_core/filter_session.c:2037:2
#5 0x911200 in gf_media_fragment_file/programs/mp4box/builds/build10/src/media_tools/isom_tools.c:3821:6
#6 0x4e6fcc in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:6455:7
#7 0x7f87ce7a50b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#8 0x41ea6d in _start (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x41ea6d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV/programs/mp4box/builds/build10/src/filters/isoffin_read_ch.c:367:22 in isor_reader_get_sample
==18741==ABORTING
``` | There is a segment fault detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2105/comments | 0 | 2022-02-08T04:16:55Z | 2022-02-08T15:23:19Z | https://github.com/gpac/gpac/issues/2105 | 1,126,773,705 | 2,105 |
[
"gpac",
"gpac"
] | ## Description
There is a segment fault detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1727-g8be34973d-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -3gp -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8020720/poc.zip)
## Crash output
```
==15809==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000012e0717 bp 0x7ffc1bf93500 sp 0x7ffc1bf934c0 T0)
==15809==The signal is caused by a READ memory access.
==15809==Hint: address points to the zero page.
#0 0x12e0717 in stsz_box_write/programs/mp4box/builds/build10/src/isomedia/box_code_base.c
#1 0x7b1a04 in gf_isom_box_write_listing/programs/mp4box/builds/build10/src/isomedia/box_funcs.c:1834:9
#2 0x7b1a04 in gf_isom_box_write/programs/mp4box/builds/build10/src/isomedia/box_funcs.c:1883:6
#3 0x803817 in WriteInterleaved/programs/mp4box/builds/build10/src/isomedia/isom_store.c:1879:9
#4 0x8008a2 in WriteToFile/programs/mp4box/builds/build10/src/isomedia/isom_store.c
#5 0x7d33b7 in gf_isom_write/programs/mp4box/builds/build10/src/isomedia/isom_read.c:600:8
#6 0x7d3983 in gf_isom_close/programs/mp4box/builds/build10/src/isomedia/isom_read.c:624:6
#7 0x4e765f in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:6547:7
#8 0x7fe25fdd30b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#9 0x41ea6d in _start (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x41ea6d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV/programs/mp4box/builds/build10/src/isomedia/box_code_base.c in stsz_box_write
==15809==ABORTING
``` | There is a segment fault detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2104/comments | 0 | 2022-02-08T04:15:45Z | 2022-02-08T15:23:19Z | https://github.com/gpac/gpac/issues/2104 | 1,126,772,982 | 2,104 |
[
"gpac",
"gpac"
] | ## Description
There is a segment fault detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1727-g8be34973d-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8020714/poc.zip)
## Crash output
```
==21814==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000014 (pc 0x00000089c556 bp 0x7ffeb0b93590 sp 0x7ffeb0b932a0 T0)
==21814==The signal is caused by a READ memory access.
==21814==Hint: address points to the zero page.
#0 0x89c556 in MergeTrack/programs/mp4box/builds/build10/src/isomedia/track.c:833:7
#1 0x7c70d3 in MergeFragment/programs/mp4box/builds/build10/src/isomedia/isom_intern.c:92:7
#2 0x7cb174 in gf_isom_parse_movie_boxes_internal/programs/mp4box/builds/build10/src/isomedia/isom_intern.c:681:9
#3 0x7cb174 in gf_isom_parse_movie_boxes/programs/mp4box/builds/build10/src/isomedia/isom_intern.c:812:6
#4 0x7ccca6 in gf_isom_open_file/programs/mp4box/builds/build10/src/isomedia/isom_intern.c:932:19
#5 0x4e14c6 in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:5984:12
#6 0x7f97cc63c0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#7 0x41ea6d in _start (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x41ea6d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV/programs/mp4box/builds/build10/src/isomedia/track.c:833:7 in MergeTrack
==21814==ABORTING
``` | There is a segment fault detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2103/comments | 0 | 2022-02-08T04:14:05Z | 2022-02-08T15:23:18Z | https://github.com/gpac/gpac/issues/2103 | 1,126,771,996 | 2,103 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1727-g8be34973d-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -cprt TEXT -dxml -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8020707/poc.zip)
## Crash output
```
==21084==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6030000010d2 at pc 0x0000007a51d3 bp 0x7ffe0b85dcf0 sp 0x7ffe0b85dce8
READ of size 1 at 0x6030000010d2 thread T0
#0 0x7a51d2 in dump_data_hex/programs/mp4box/builds/build10/src/isomedia/box_dump.c:50:45
#1 0x7a51d2 in senc_box_dump/programs/mp4box/builds/build10/src/isomedia/box_dump.c:5245:5
#2 0x7b2d7b in gf_isom_box_dump/programs/mp4box/builds/build10/src/isomedia/box_funcs.c:2065:2
#3 0x78297a in gf_isom_box_array_dump/programs/mp4box/builds/build10/src/isomedia/box_dump.c:101:3
#4 0x7b35c5 in gf_isom_box_dump_done/programs/mp4box/builds/build10/src/isomedia/box_funcs.c:2072:3
#5 0x784d03 in trak_box_dump/programs/mp4box/builds/build10/src/isomedia/box_dump.c:550:2
#6 0x7b2d7b in gf_isom_box_dump/programs/mp4box/builds/build10/src/isomedia/box_funcs.c:2065:2
#7 0x78297a in gf_isom_box_array_dump/programs/mp4box/builds/build10/src/isomedia/box_dump.c:101:3
#8 0x7b35c5 in gf_isom_box_dump_done/programs/mp4box/builds/build10/src/isomedia/box_funcs.c:2072:3
#9 0x7834ac in moov_box_dump/programs/mp4box/builds/build10/src/isomedia/box_dump.c:217:2
#10 0x7b2d7b in gf_isom_box_dump/programs/mp4box/builds/build10/src/isomedia/box_funcs.c:2065:2
#11 0x782c5a in gf_isom_dump/programs/mp4box/builds/build10/src/isomedia/box_dump.c:135:3
#12 0x4f7e9c in dump_isom_xml/programs/mp4box/builds/build10/applications/mp4box/filedump.c:1950:6
#13 0x4e0da8 in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:6171:7
#14 0x7f332d85d0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#15 0x41ea6d in _start (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x41ea6d)
0x6030000010d2 is located 0 bytes to the right of 18-byte region [0x6030000010c0,0x6030000010d2)
allocated by thread T0 here:
#0 0x499ccd in malloc (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x499ccd)
#1 0x13165d6 in senc_Parse/programs/mp4box/builds/build10/src/isomedia/box_code_drm.c:1453:21
#2 0x89e633 in MergeTrack/programs/mp4box/builds/build10/src/isomedia/track.c:1129:4
#3 0x7c70d3 in MergeFragment/programs/mp4box/builds/build10/src/isomedia/isom_intern.c:92:7
#4 0x7cb174 in gf_isom_parse_movie_boxes_internal/programs/mp4box/builds/build10/src/isomedia/isom_intern.c:681:9
#5 0x7cb174 in gf_isom_parse_movie_boxes/programs/mp4box/builds/build10/src/isomedia/isom_intern.c:812:6
#6 0x7ccca6 in gf_isom_open_file/programs/mp4box/builds/build10/src/isomedia/isom_intern.c:932:19
#7 0x4e14c6 in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:5984:12
#8 0x7f332d85d0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow/programs/mp4box/builds/build10/src/isomedia/box_dump.c:50:45 in dump_data_hex
Shadow bytes around the buggy address:
0x0c067fff81c0: 04 fa fa fa fd fd fd fa fa fa 00 00 00 00 fa fa
0x0c067fff81d0: 00 00 00 fa fa fa 00 00 00 00 fa fa 00 00 02 fa
0x0c067fff81e0: fa fa 00 00 00 00 fa fa 00 00 02 fa fa fa 00 00
0x0c067fff81f0: 00 00 fa fa 00 00 00 fa fa fa 00 00 00 00 fa fa
0x0c067fff8200: 00 00 00 fa fa fa 00 00 00 00 fa fa 00 00 00 fa
=>0x0c067fff8210: fa fa 00 00 00 00 fa fa 00 00[02]fa fa fa fd fd
0x0c067fff8220: fd fd fa fa 00 00 00 fa fa fa 00 00 04 fa fa fa
0x0c067fff8230: 00 00 01 fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8240: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==21084==ABORTING
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2102/comments | 0 | 2022-02-08T04:12:49Z | 2022-02-08T15:23:18Z | https://github.com/gpac/gpac/issues/2102 | 1,126,771,290 | 2,102 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1727-g8be34973d-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -frag 0 -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8020690/poc.zip)
## Crash output
```
==4028==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000003372 at pc 0x000000499077 bp 0x7ffce0570950 sp 0x7ffce0570118
READ of size 3 at 0x602000003372 thread T0
#0 0x499076 in __asan_memcpy (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x499076)
#1 0x548483 in gf_bs_write_data/programs/mp4box/builds/build10/src/utils/bitstream.c:1045:4
#2 0x87195e in gf_isom_fragment_add_sample/programs/mp4box/builds/build10/src/isomedia/movie_fragments.c:2760:9
#3 0xd7c9b7 in mp4_mux_process_sample/programs/mp4box/builds/build10/src/filters/mux_isom.c:4105:9
#4 0xd727e8 in mp4_mux_process_fragmented/programs/mp4box/builds/build10/src/filters/mux_isom.c:5637:8
#5 0xd6d05f in mp4_mux_process/programs/mp4box/builds/build10/src/filters/mux_isom.c:6071:14
#6 0xb7d866 in gf_filter_process_task/programs/mp4box/builds/build10/src/filter_core/filter.c:2555:7
#7 0xb5e41b in gf_fs_thread_proc/programs/mp4box/builds/build10/src/filter_core/filter_session.c:1793:3
#8 0xb5d2c4 in gf_fs_run/programs/mp4box/builds/build10/src/filter_core/filter_session.c:2037:2
#9 0x911200 in gf_media_fragment_file/programs/mp4box/builds/build10/src/media_tools/isom_tools.c:3821:6
#10 0x4e6fcc in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:6455:7
#11 0x7f0e712900b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#12 0x41ea6d in _start (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x41ea6d)
0x602000003372 is located 0 bytes to the right of 2-byte region [0x602000003370,0x602000003372)
allocated by thread T0 here:
#0 0x499ccd in malloc (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x499ccd)
#1 0x155f40e in gf_filter_pck_new_alloc_internal/programs/mp4box/builds/build10/src/filter_core/filter_pck.c:151:15
#2 0xd0481d in isoffin_process/programs/mp4box/builds/build10/src/filters/isoffin_read.c:1343:12
#3 0xb7d866 in gf_filter_process_task/programs/mp4box/builds/build10/src/filter_core/filter.c:2555:7
#4 0xb5e41b in gf_fs_thread_proc/programs/mp4box/builds/build10/src/filter_core/filter_session.c:1793:3
#5 0xb5d2c4 in gf_fs_run/programs/mp4box/builds/build10/src/filter_core/filter_session.c:2037:2
#6 0x911200 in gf_media_fragment_file/programs/mp4box/builds/build10/src/media_tools/isom_tools.c:3821:6
#7 0x4e6fcc in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:6455:7
#8 0x7f0e712900b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x499076) in __asan_memcpy
Shadow bytes around the buggy address:
0x0c047fff8610: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8620: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8630: fa fa fd fd fa fa fd fd fa fa fd fd fa fa 00 00
0x0c047fff8640: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8650: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
=>0x0c047fff8660: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa[02]fa
0x0c047fff8670: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8680: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8690: fa fa fd fd fa fa 00 00 fa fa 04 fa fa fa 00 00
0x0c047fff86a0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff86b0: fa fa 00 00 fa fa 00 fa fa fa 00 00 fa fa 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==4028==ABORTING
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2101/comments | 0 | 2022-02-08T04:11:25Z | 2022-02-08T15:23:18Z | https://github.com/gpac/gpac/issues/2101 | 1,126,770,464 | 2,101 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1727-g8be34973d-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -dxml -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8020674/poc.zip)
## Crash output
```
==10522==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000001009 at pc 0x0000004f4e0b bp 0x7ffcd88db5d0 sp 0x7ffcd88db5c8
READ of size 1 at 0x611000001009 thread T0
#0 0x4f4e0a in read_nal_size_hdr/programs/mp4box/builds/build10/applications/mp4box/filedump.c:1007:20
#1 0x4f4e0a in dump_isom_nal_ex/programs/mp4box/builds/build10/applications/mp4box/filedump.c:1271:15
#2 0x4f8170 in dump_isom_xml/programs/mp4box/builds/build10/applications/mp4box/filedump.c:2001:9
#3 0x4e0da8 in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:6171:7
#4 0x7fa1487680b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#5 0x41ea6d in _start (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x41ea6d)
0x611000001009 is located 0 bytes to the right of 201-byte region [0x611000000f40,0x611000001009)
allocated by thread T0 here:
#0 0x499ccd in malloc (/zhengjie/cmdline-fuzz/programs/mp4box/builds/build10/bin/gcc/MP4Box+0x499ccd)
#1 0x841fd9 in Media_GetSample/programs/mp4box/builds/build10/src/isomedia/media.c:625:29
#2 0x7d9fd0 in gf_isom_get_sample_ex/programs/mp4box/builds/build10/src/isomedia/isom_read.c:1905:6
#3 0x4f40a0 in dump_isom_nal_ex/programs/mp4box/builds/build10/applications/mp4box/filedump.c:1234:24
#4 0x4f8170 in dump_isom_xml/programs/mp4box/builds/build10/applications/mp4box/filedump.c:2001:9
#5 0x4e0da8 in mp4boxMain/programs/mp4box/builds/build10/applications/mp4box/main.c:6171:7
#6 0x7fa1487680b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow/programs/mp4box/builds/build10/applications/mp4box/filedump.c:1007:20 in read_nal_size_hdr
Shadow bytes around the buggy address:
0x0c227fff81b0: 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa
0x0c227fff81c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff81d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fa fa
0x0c227fff81e0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c227fff81f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c227fff8200: 00[01]fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8230: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8240: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==10522==ABORTING
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2100/comments | 0 | 2022-02-08T04:09:59Z | 2022-02-08T15:23:18Z | https://github.com/gpac/gpac/issues/2100 | 1,126,769,626 | 2,100 |
[
"gpac",
"gpac"
] | Command run:
`gpac --lowlat=no --buffer=8000 -i out/live.mpd#VR @ compositor:fsize=true:sz=true:tvtd=partial @ vout @1 aout`
The test data used is [here](https://www.mediafire.com/file/2r7s1i0tst06ane/out.zip/file)
What happens:
The vout opens a small window, with a content resolution corresponding to the size of the window.
When the window size is increased, the content inside stays low res.
As a workaround, I currently output to the maximum height of screen using a batch command like this:
```
@ECHO OFF
setlocal ENABLEDELAYEDEXPANSION
setlocal ENABLEEXTENSIONS
set wmicheight="wmic desktopmonitor get screenheight /format:value"
:height
for /f "tokens=2 delims==" %%a in ('%wmicheight%') do (
If %%a LEQ 1 (
rem skip if height is not bigger than 1
) Else (
rem take the first height value larger than 1
rem then skip to width
Set /a "height=%%a"
)
)
gpac --lowlat=no --buffer=8000 -i out/live.mpd#VR @ compositor:fsize=true:sz=true:osize=%height%x%height%:tvtd=partial @ vout @1 aout
```
Tested with version 7535448f4acd2deaf0400922202f78fc0ae7fb6c on both ubuntu 20.04 (compiled manually) and Windows 11 (installer).
----
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
| Compositor osize not scaling with the viewport | https://api.github.com/repos/gpac/gpac/issues/2099/comments | 1 | 2022-02-07T02:23:15Z | 2022-06-09T11:12:48Z | https://github.com/gpac/gpac/issues/2099 | 1,125,430,301 | 2,099 |
[
"gpac",
"gpac"
] | - [x] I looked for a similar issue and couldn't find any.
- [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ -- no, because the issue is about compilation.
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
a6b64082b43226f51dff69a5e241049cf5e7eb83 makes compiling fail like so:
```sh
[...]
CC crypto/g_crypt_tinyaes.c
crypto/g_crypt_tinyaes.c:251:7: error: use of undeclared identifier 'GF_ECB'
case GF_ECB:
^
CC crypto/tiny_aes.c
1 error generated.
make[1]: *** [crypto/g_crypt_tinyaes.o] Error 1
make[1]: *** Waiting for unfinished jobs....
make: *** [all] Error 2
``` | compilation on mac os fails after latest change in tinyaes.c | https://api.github.com/repos/gpac/gpac/issues/2098/comments | 2 | 2022-02-04T10:23:25Z | 2022-02-04T15:02:05Z | https://github.com/gpac/gpac/issues/2098 | 1,124,037,091 | 2,098 |
[
"gpac",
"gpac"
] | ## Description
There is a segment fault detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1705-gc3ed3094a-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -isma -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8000909/poc.zip)
## Crash output
```
==3234==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000028 (pc 0x0000008a27ee bp 0x7ffe76cfa230 sp 0x7ffe76cfa0a0 T0)
==3234==The signal is caused by a READ memory access.
==3234==Hint: address points to the zero page.
#0 0x8a27ee in Track_SetStreamDescriptor /programs/mp4box/builds/build8/src/isomedia/track.c:1506:52
#1 0x8141f5 in gf_isom_change_mpeg4_description /programs/mp4box/builds/build8/src/isomedia/isom_write.c:1654:6
#2 0x8fa401 in gf_media_make_isma /programs/mp4box/builds/build8/src/media_tools/isom_tools.c:604:13
#3 0x4e4934 in mp4boxMain /programs/mp4box/builds/build8/applications/mp4box/main.c:6332:8
#4 0x7f0a8deca0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#5 0x41ea6d in _start (/programs/mp4box/builds/build8/bin/gcc/MP4Box+0x41ea6d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /programs/mp4box/builds/build8/src/isomedia/track.c:1506:52 in Track_SetStreamDescriptor
==3234==ABORTING
``` | There is a segment fault detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2097/comments | 0 | 2022-02-04T07:29:05Z | 2022-02-04T09:04:42Z | https://github.com/gpac/gpac/issues/2097 | 1,123,896,639 | 2,097 |
[
"gpac",
"gpac"
] | ## Description
There is a segment fault detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1705-gc3ed3094a-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -dxml -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8000905/poc.zip)
## Crash output
```
==16957==ERROR: AddressSanitizer: SEGV on unknown address 0x62d000142554 (pc 0x00000093684b bp 0x7fff830b8310 sp 0x7fff830b8180 T0)
==16957==The signal is caused by a READ memory access.
#0 0x93684b in avc_parse_slice /programs/mp4box/builds/build8/src/media_tools/av_parsers.c:5730:7
#1 0x93684b in gf_avc_parse_nalu /programs/mp4box/builds/build8/src/media_tools/av_parsers.c:6142:9
#2 0xcda24e in gf_inspect_dump_nalu_internal /programs/mp4box/builds/build8/src/filters/inspect.c:1068:9
#3 0xcd8b3f in gf_inspect_dump_nalu /programs/mp4box/builds/build8/src/filters/inspect.c:1222:2
#4 0x4f4863 in dump_isom_nal_ex /programs/mp4box/builds/build8/applications/mp4box/filedump.c:1288:5
#5 0x4f8170 in dump_isom_xml /programs/mp4box/builds/build8/applications/mp4box/filedump.c:2001:9
#6 0x4e0da8 in mp4boxMain /programs/mp4box/builds/build8/applications/mp4box/main.c:6171:7
#7 0x7f99dcef20b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#8 0x41ea6d in _start (/programs/mp4box/builds/build8/bin/gcc/MP4Box+0x41ea6d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /programs/mp4box/builds/build8/src/media_tools/av_parsers.c:5730:7 in avc_parse_slice
==16957==ABORTING
``` | There is a segment fault detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2096/comments | 0 | 2022-02-04T07:27:44Z | 2022-02-04T09:04:42Z | https://github.com/gpac/gpac/issues/2096 | 1,123,895,870 | 2,096 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1705-gc3ed3094a-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -frag 0 -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8000900/poc.zip)
## Crash output
```
==14498==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000001d98 at pc 0x000000d7a998 bp 0x7ffce025f450 sp 0x7ffce025f448
READ of size 1 at 0x603000001d98 thread T0
#0 0xd7a997 in mp4_mux_cenc_update /programs/mp4box/builds/build8/src/filters/mux_isom.c:3779:21
#1 0xd7db16 in mp4_mux_process_sample /programs/mp4box/builds/build8/src/filters/mux_isom.c:4125:8
#2 0xd721d8 in mp4_mux_process_fragmented /programs/mp4box/builds/build8/src/filters/mux_isom.c:5618:8
#3 0xd6ca6f in mp4_mux_process /programs/mp4box/builds/build8/src/filters/mux_isom.c:6048:14
#4 0xb7d3d6 in gf_filter_process_task /programs/mp4box/builds/build8/src/filter_core/filter.c:2548:7
#5 0xb5df8b in gf_fs_thread_proc /programs/mp4box/builds/build8/src/filter_core/filter_session.c:1793:3
#6 0xb5ce34 in gf_fs_run /programs/mp4box/builds/build8/src/filter_core/filter_session.c:2037:2
#7 0x9110e0 in gf_media_fragment_file /programs/mp4box/builds/build8/src/media_tools/isom_tools.c:3821:6
#8 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build8/applications/mp4box/main.c:6455:7
#9 0x7fc1176470b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#10 0x41ea6d in _start (/programs/mp4box/builds/build8/bin/gcc/MP4Box+0x41ea6d)
0x603000001d98 is located 0 bytes to the right of 24-byte region [0x603000001d80,0x603000001d98)
allocated by thread T0 here:
#0 0x499fe9 in realloc (/programs/mp4box/builds/build8/bin/gcc/MP4Box+0x499fe9)
#1 0xb50901 in gf_props_assign_value /programs/mp4box/builds/build8/src/filter_core/filter_props.c:960:32
#2 0xb50901 in gf_props_insert_property /programs/mp4box/builds/build8/src/filter_core/filter_props.c:1031:2
#3 0xd0483e in isoffin_process /programs/mp4box/builds/build8/src/filters/isoffin_read.c:1397:6
#4 0xb7d3d6 in gf_filter_process_task /programs/mp4box/builds/build8/src/filter_core/filter.c:2548:7
#5 0xb5df8b in gf_fs_thread_proc /programs/mp4box/builds/build8/src/filter_core/filter_session.c:1793:3
#6 0xb5ce34 in gf_fs_run /programs/mp4box/builds/build8/src/filter_core/filter_session.c:2037:2
#7 0x9110e0 in gf_media_fragment_file /programs/mp4box/builds/build8/src/media_tools/isom_tools.c:3821:6
#8 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build8/applications/mp4box/main.c:6455:7
#9 0x7fc1176470b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow /programs/mp4box/builds/build8/src/filters/mux_isom.c:3779:21 in mp4_mux_cenc_update
Shadow bytes around the buggy address:
0x0c067fff8360: fa fa fd fd fd fa fa fa fd fd fd fd fa fa 00 00
0x0c067fff8370: 00 fa fa fa fd fd fd fd fa fa 00 00 00 00 fa fa
0x0c067fff8380: fd fd fd fa fa fa 00 00 00 fa fa fa 00 00 00 00
0x0c067fff8390: fa fa 00 00 00 06 fa fa fd fd fd fa fa fa fd fd
0x0c067fff83a0: fd fd fa fa 00 00 00 fa fa fa 00 00 00 00 fa fa
=>0x0c067fff83b0: 00 00 00[fa]fa fa 00 00 00 00 fa fa 00 00 00 fa
0x0c067fff83c0: fa fa fd fd fd fa fa fa fd fd fd fd fa fa 00 00
0x0c067fff83d0: 00 fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff83e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff83f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8400: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==14498==ABORTING
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2095/comments | 0 | 2022-02-04T07:26:20Z | 2022-02-04T09:04:42Z | https://github.com/gpac/gpac/issues/2095 | 1,123,894,991 | 2,095 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1705-gc3ed3094a-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -dxml -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/8000892/poc.zip)
## Crash output
```
==5605==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6030000012b5 at pc 0x000000cdf2da bp 0x7ffebb3cfc90 sp 0x7ffebb3cfc88
READ of size 1 at 0x6030000012b5 thread T0
#0 0xcdf2d9 in inspect_get_nal_size /programs/mp4box/builds/build8/src/filters/inspect.c:177:20
#1 0xcdf2d9 in gf_inspect_dump_nalu_internal /programs/mp4box/builds/build8/src/filters/inspect.c:1182:15
#2 0xcd8b3f in gf_inspect_dump_nalu /programs/mp4box/builds/build8/src/filters/inspect.c:1222:2
#3 0x4f4863 in dump_isom_nal_ex /programs/mp4box/builds/build8/applications/mp4box/filedump.c:1288:5
#4 0x4f8170 in dump_isom_xml /programs/mp4box/builds/build8/applications/mp4box/filedump.c:2001:9
#5 0x4e0da8 in mp4boxMain /programs/mp4box/builds/build8/applications/mp4box/main.c:6171:7
#6 0x7fbf444fb0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#7 0x41ea6d in _start (/programs/mp4box/builds/build8/bin/gcc/MP4Box+0x41ea6d)
0x6030000012b5 is located 0 bytes to the right of 21-byte region [0x6030000012a0,0x6030000012b5)
allocated by thread T0 here:
#0 0x499ccd in malloc (/programs/mp4box/builds/build8/bin/gcc/MP4Box+0x499ccd)
#1 0x841fd9 in Media_GetSample /programs/mp4box/builds/build8/src/isomedia/media.c:625:29
#2 0x7d9fd0 in gf_isom_get_sample_ex /programs/mp4box/builds/build8/src/isomedia/isom_read.c:1905:6
#3 0x4f40a0 in dump_isom_nal_ex /programs/mp4box/builds/build8/applications/mp4box/filedump.c:1234:24
#4 0x4f8170 in dump_isom_xml /programs/mp4box/builds/build8/applications/mp4box/filedump.c:2001:9
#5 0x4e0da8 in mp4boxMain /programs/mp4box/builds/build8/applications/mp4box/main.c:6171:7
#6 0x7fbf444fb0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow /programs/mp4box/builds/build8/src/filters/inspect.c:177:20 in inspect_get_nal_size
Shadow bytes around the buggy address:
0x0c067fff8200: fd fd fd fa fa fa fd fd fd fa fa fa 00 00 04 fa
0x0c067fff8210: fa fa 00 00 04 fa fa fa fd fd fd fa fa fa fd fd
0x0c067fff8220: fd fa fa fa fd fd fd fa fa fa fd fd fd fa fa fa
0x0c067fff8230: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd fa
0x0c067fff8240: fa fa fd fd fd fd fa fa fd fd fd fa fa fa fd fd
=>0x0c067fff8250: fd fa fa fa 00 00[05]fa fa fa fa fa fa fa fa fa
0x0c067fff8260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff82a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==5605==ABORTING
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2094/comments | 0 | 2022-02-04T07:24:57Z | 2022-02-04T09:04:41Z | https://github.com/gpac/gpac/issues/2094 | 1,123,894,120 | 2,094 |
[
"gpac",
"gpac"
] |
[poc.zip](https://github.com/gpac/gpac/files/7989436/poc.zip)
```
Description
Null Pointer Dereference in afrt_box_read
gdb output
pwndbg> r -bt poc
Starting program: /run/shm/gpac/bin/gcc/MP4Box -bt poc
ERROR: Could not find ELF base!
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
[iso file] Box "meta" (start 0) has 5 extra bytes
Program received signal SIGSEGV, Segmentation fault.
0x00007ffff79aedfe in afrt_box_read () from /run/shm/gpac/bin/gcc/libgpac.so.10
LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA
───────────────────────────────────────────────────────────────────────────────[ REGISTERS ]────────────────────────────────────────────────────────────────────────────────
RAX 0xffffffff
RBX 0x5555555ca500 —▸ 0x5555555c92e0 ◂— 0xfbad2498
RCX 0x5555555ca8b0 ◂— 0x0
RDX 0x491
RDI 0x0
RSI 0x5555555ca890 ◂— 0x0
R8 0x5555555ca8a0 —▸ 0x7ffff770bbe0 (main_arena+96) —▸ 0x5555555d2910 ◂— 0x33 /* '3' */
R9 0x5555555cad40 ◂— 0x490
R10 0x5555555c9010 ◂— 0x3000200050000
R11 0x7ffff770bbe0 (main_arena+96) —▸ 0x5555555d2910 ◂— 0x33 /* '3' */
R12 0x7
R13 0xffffffff
R14 0x5555555caf60 ◂— 0x61667274 /* 'trfa' */
R15 0x8
RBP 0x5555555ca8a0 —▸ 0x7ffff770bbe0 (main_arena+96) —▸ 0x5555555d2910 ◂— 0x33 /* '3' */
RSP 0x7fffffff7dd0 ◂— 0x5
RIP 0x7ffff79aedfe (afrt_box_read+142) ◂— mov byte ptr [rbp + rax], 0
─────────────────────────────────────────────────────────────────────────────────[ DISASM ]─────────────────────────────────────────────────────────────────────────────────
► 0x7ffff79aedfe <afrt_box_read+142> mov byte ptr [rbp + rax], 0
0x7ffff79aee03 <afrt_box_read+147> test r13d, r13d
0x7ffff79aee06 <afrt_box_read+150> je afrt_box_read+343 <afrt_box_read+343>
↓
0x7ffff79aeec7 <afrt_box_read+343> mov rax, qword ptr [r14 + 8]
0x7ffff79aeecb <afrt_box_read+347> jmp afrt_box_read+224 <afrt_box_read+224>
↓
0x7ffff79aee50 <afrt_box_read+224> mov r15d, dword ptr [rsp + 0xc]
0x7ffff79aee55 <afrt_box_read+229> mov rdi, qword ptr [r14 + 0x30]
0x7ffff79aee59 <afrt_box_read+233> mov qword ptr [r14 + 8], rax
0x7ffff79aee5d <afrt_box_read+237> mov rsi, rbp
0x7ffff79aee60 <afrt_box_read+240> mov edx, r15d
0x7ffff79aee63 <afrt_box_read+243> call gf_list_insert@plt <gf_list_insert@plt>
─────────────────────────────────────────────────────────────────────────────────[ STACK ]──────────────────────────────────────────────────────────────────────────────────
00:0000│ rsp 0x7fffffff7dd0 ◂— 0x5
01:0008│ 0x7fffffff7dd8 ◂— 0x555ca7d0
02:0010│ 0x7fffffff7de0 ◂— 0x8
03:0018│ 0x7fffffff7de8 —▸ 0x7fffffff7f60 ◂— 0x0
04:0020│ 0x7fffffff7df0 —▸ 0x5555555ca500 —▸ 0x5555555c92e0 ◂— 0xfbad2498
05:0028│ 0x7fffffff7df8 ◂— 0x18
06:0030│ 0x7fffffff7e00 ◂— 0x61667274 /* 'trfa' */
07:0038│ 0x7fffffff7e08 —▸ 0x5555555caf60 ◂— 0x61667274 /* 'trfa' */
───────────────────────────────────────────────────────────────────────────────[ BACKTRACE ]────────────────────────────────────────────────────────────────────────────────
► f 0 0x7ffff79aedfe afrt_box_read+142
f 1 0x7ffff79562a9 gf_isom_box_parse_ex+1145
f 2 0x7ffff7956a50 gf_isom_parse_root_box+64
f 3 0x7ffff795f16c gf_isom_parse_movie_boxes_internal+236
f 4 0x7ffff79608f7 gf_isom_open_file+311
f 5 0x55555557f614 mp4boxMain+19444
f 6 0x7ffff75470b3 __libc_start_main+243
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
pwndbg> bt
#0 0x00007ffff79aedfe in afrt_box_read () from /run/shm/gpac/bin/gcc/libgpac.so.10
#1 0x00007ffff79562a9 in gf_isom_box_parse_ex () from /run/shm/gpac/bin/gcc/libgpac.so.10
#2 0x00007ffff7956a50 in gf_isom_parse_root_box () from /run/shm/gpac/bin/gcc/libgpac.so.10
#3 0x00007ffff795f16c in gf_isom_parse_movie_boxes_internal () from /run/shm/gpac/bin/gcc/libgpac.so.10
#4 0x00007ffff79608f7 in gf_isom_open_file () from /run/shm/gpac/bin/gcc/libgpac.so.10
#5 0x000055555557f614 in mp4boxMain ()
#6 0x00007ffff75470b3 in __libc_start_main (main=0x55555556d500 <main>, argc=3, argv=0x7fffffffdda8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>,
stack_end=0x7fffffffdd98) at ../csu/libc-start.c:308
#7 0x000055555556d53e in _start ()
Impact
This vulnerability is capable of crashing software, so I think this can be described as DoS.
Occurences
box_code_adobe.c L686
``` | NULL Pointer Dereference | https://api.github.com/repos/gpac/gpac/issues/2093/comments | 0 | 2022-02-02T19:21:15Z | 2022-02-04T09:04:41Z | https://github.com/gpac/gpac/issues/2093 | 1,122,297,501 | 2,093 |
[
"gpac",
"gpac"
] | [poc.zip](https://github.com/gpac/gpac/files/7978702/poc.zip)
```
Description
Null Pointer Dereference in gitn_box_del
./MP4Box -bt ./poc
Sanitizer output:
AddressSanitizer:DEADLYSIGNAL
=================================================================
==6791==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x7f32f604f350 bp 0x606000000380 sp 0x7ffec6197280 T0)
==6791==The signal is caused by a READ memory access.
==6791==Hint: address points to the zero page.
#0 0x7f32f604f350 in gitn_box_del (/home/presler/fuzzing/gpac/bin/gcc/libgpac.so.10+0x1cc350)
#1 0x7f32f606c54d in gf_isom_box_del (/home/presler/fuzzing/gpac/bin/gcc/libgpac.so.10+0x1e954d)
#2 0x7f32f606c32e in gf_isom_box_parse_ex (/home/presler/fuzzing/gpac/bin/gcc/libgpac.so.10+0x1e932e)
#3 0x7f32f606baab in gf_isom_parse_root_box (/home/presler/fuzzing/gpac/bin/gcc/libgpac.so.10+0x1e8aab)
#4 0x7f32f60747bd in gf_isom_parse_movie_boxes (/home/presler/fuzzing/gpac/bin/gcc/libgpac.so.10+0x1f17bd)
#5 0x7f32f6075ca5 in gf_isom_open_file (/home/presler/fuzzing/gpac/bin/gcc/libgpac.so.10+0x1f2ca5)
#6 0x4de8fd in mp4boxMain (/home/presler/fuzzing/gpac/bin/gcc/MP4Box+0x4de8fd)
#7 0x7f32f5afc0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #8 0x429b2d in _start (/home/presler/fuzzing/gpac/bin/gcc/MP4Box+0x429b2d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/home/presler/fuzzing/gpac/bin/gcc/libgpac.so.10+0x1cc350) in gitn_box_del
==6791==ABORTING
gdb output
gdb ./MP4Box -q
Reading symbols from ./MP4Box...
pwndbg> r -bt ./poc
Starting program: /home/presler/fuzzing/gpac_pure/bin/gcc/MP4Box -bt ./poc
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
[iso file] Box "meta" (start 0) has 5 extra bytes
[iso file] Unknown top-level box type 0000
Program received signal SIGSEGV, Segmentation fault.
0x00007ffff7936e3f in gitn_box_del () from /home/presler/fuzzing/gpac_pure/bin/gcc/libgpac.so.10
LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA
─────────────────────────────────────────────[ REGISTERS ]────────────────────────────────────────────── RAX 0x0
RBX 0x0
RCX 0x10000100
RDX 0x3030
RDI 0x5555555d22f0 ◂— 0x6769746e /* 'ntig' */
RSI 0x7ffff7df51ba ◂— 'no-check'
R8 0x0
R9 0x0
R10 0x7ffff7748e42 ◂— 'gf_isom_box_del'
R11 0x7ffff7955d40 (gf_isom_box_del) ◂— endbr64
R12 0x0
R13 0x6769746e
R14 0x5555555d22f0 ◂— 0x6769746e /* 'ntig' */
R15 0xffffffec
RBP 0x5555555d22f0 ◂— 0x6769746e /* 'ntig' */
RSP 0x7fffffff7d40 —▸ 0x5555555d22f0 ◂— 0x6769746e /* 'ntig' */
RIP 0x7ffff7936e3f (gitn_box_del+47) ◂— mov rdi, qword ptr [r8 + rax + 8]
───────────────────────────────────────────────[ DISASM ]─────────────────────────────────────────────── ► 0x7ffff7936e3f <gitn_box_del+47> mov rdi, qword ptr [r8 + rax + 8]
0x7ffff7936e44 <gitn_box_del+52> test rdi, rdi
0x7ffff7936e47 <gitn_box_del+55> je gitn_box_del+112 <gitn_box_del+112>
↓
0x7ffff7936e80 <gitn_box_del+112> add rbx, 1
0x7ffff7936e84 <gitn_box_del+116> movzx eax, dx
0x7ffff7936e87 <gitn_box_del+119> cmp eax, ebx
0x7ffff7936e89 <gitn_box_del+121> ja gitn_box_del+40 <gitn_box_del+40>
↓
0x7ffff7936e38 <gitn_box_del+40> mov rax, rbx
0x7ffff7936e3b <gitn_box_del+43> shl rax, 4
0x7ffff7936e3f <gitn_box_del+47> mov rdi, qword ptr [r8 + rax + 8]
0x7ffff7936e44 <gitn_box_del+52> test rdi, rdi
───────────────────────────────────────────────[ STACK ]────────────────────────────────────────────────00:0000│ rsp 0x7fffffff7d40 —▸ 0x5555555d22f0 ◂— 0x6769746e /* 'ntig' */
01:0008│ 0x7fffffff7d48 —▸ 0x7fffffff7ec0 ◂— 0x0
02:0010│ 0x7fffffff7d50 —▸ 0x5555555d22f0 ◂— 0x6769746e /* 'ntig' */
03:0018│ 0x7fffffff7d58 —▸ 0x7ffff7955d6c (gf_isom_box_del+44) ◂— test r12, r12
04:0020│ 0x7fffffff7d60 —▸ 0x7fffffff7ec0 ◂— 0x0
05:0028│ 0x7fffffff7d68 —▸ 0x5555555ca500 —▸ 0x5555555c92e0 ◂— 0xfbad2498
06:0030│ 0x7fffffff7d70 ◂— 0x11
07:0038│ 0x7fffffff7d78 —▸ 0x7ffff7956570 (gf_isom_box_parse_ex+1888) ◂— cmp qword ptr [rsp + 8], 0
─────────────────────────────────────────────[ BACKTRACE ]────────────────────────────────────────────── ► f 0 0x7ffff7936e3f gitn_box_del+47
f 1 0x7ffff7955d6c gf_isom_box_del+44
f 2 0x7ffff7956570 gf_isom_box_parse_ex+1888
f 3 0x7ffff7956a30 gf_isom_parse_root_box+64
f 4 0x7ffff795f17c gf_isom_parse_movie_boxes_internal+236
f 5 0x7ffff7960907 gf_isom_open_file+311
f 6 0x55555557f614 mp4boxMain+19444
f 7 0x7ffff75470b3 __libc_start_main+243
────────────────────────────────────────────────────────────────────────────────────────────────────────pwndbg> bt
#0 0x00007ffff7936e3f in gitn_box_del () from /home/presler/fuzzing/gpac_pure/bin/gcc/libgpac.so.10
#1 0x00007ffff7955d6c in gf_isom_box_del () from /home/presler/fuzzing/gpac_pure/bin/gcc/libgpac.so.10#2 0x00007ffff7956570 in gf_isom_box_parse_ex () from /home/presler/fuzzing/gpac_pure/bin/gcc/libgpac.so.10
#3 0x00007ffff7956a30 in gf_isom_parse_root_box () from /home/presler/fuzzing/gpac_pure/bin/gcc/libgpac.so.10
#4 0x00007ffff795f17c in gf_isom_parse_movie_boxes_internal () from /home/presler/fuzzing/gpac_pure/bin/gcc/libgpac.so.10
#5 0x00007ffff7960907 in gf_isom_open_file () from /home/presler/fuzzing/gpac_pure/bin/gcc/libgpac.so.10
#6 0x000055555557f614 in mp4boxMain ()
#7 0x00007ffff75470b3 in __libc_start_main (main=0x55555556d500 <main>, argc=3, argv=0x7fffffffdd08, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffdcf8) at ../csu/libc-start.c:308
#8 0x000055555556d53e in _start ()
Impact
This vulnerability is capable of crashing software, so I think this can be described as DoS.
``` | NULL Pointer Dereference | https://api.github.com/repos/gpac/gpac/issues/2092/comments | 0 | 2022-02-01T13:20:16Z | 2022-02-01T14:29:21Z | https://github.com/gpac/gpac/issues/2092 | 1,120,666,256 | 2,092 |
[
"gpac",
"gpac"
] | ## Description
There is a stack-overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1687-g16bd902cb-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -bt -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/7976897/poc.zip)
## Crash output
```
==29792==ERROR: AddressSanitizer: stack-overflow on address 0x7ffc31990fa8 (pc 0x000000430a83 bp 0x7ffc319917f0 sp 0x7ffc31990fb0 T0)
#0 0x430a83 in strlen (/programs/mp4box/builds/build6/bin/gcc/MP4Box+0x430a83)
#1 0x75400e in SFS_AddString /programs/mp4box/builds/build6/src/bifs/script_dec.c:74:6
#2 0x75607e in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#3 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#4 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#5 0x7561e1 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:568:3
#6 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#7 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#8 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#9 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#10 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#11 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#12 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#13 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#14 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#15 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#16 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#17 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#18 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#19 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#20 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#21 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#22 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#23 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#24 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#25 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#26 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#27 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#28 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#29 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#30 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#31 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#32 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#33 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#34 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#35 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#36 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#37 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#38 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#39 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#40 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#41 0x755bee in SFS_ArrayDeref /programs/mp4box/builds/build6/src/bifs/script_dec.c:693:2
#42 0x755bee in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:504:3
#43 0x7561e1 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:568:3
#44 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#45 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#46 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#47 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#48 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#49 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#50 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#51 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#52 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#53 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#54 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#55 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#56 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#57 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#58 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#59 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#60 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#61 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#62 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#63 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#64 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#65 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#66 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#67 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#68 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#69 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#70 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#71 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#72 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#73 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#74 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#75 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#76 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#77 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#78 0x755bee in SFS_ArrayDeref /programs/mp4box/builds/build6/src/bifs/script_dec.c:693:2
#79 0x755bee in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:504:3
#80 0x756154 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:466:3
#81 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#82 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#83 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#84 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#85 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#86 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#87 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#88 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#89 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#90 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#91 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#92 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#93 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#94 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#95 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#96 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#97 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#98 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#99 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#100 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#101 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#102 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#103 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#104 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#105 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#106 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#107 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#108 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#109 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#110 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#111 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#112 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#113 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#114 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#115 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#116 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#117 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#118 0x756038 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:603:3
#119 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#120 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#121 0x75619a in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:474:3
#122 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#123 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#124 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#125 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#126 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#127 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#128 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#129 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#130 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#131 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#132 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#133 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#134 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#135 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#136 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#137 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#138 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#139 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#140 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#141 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#142 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#143 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#144 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#145 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#146 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#147 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#148 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#149 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#150 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#151 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#152 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#153 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#154 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#155 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#156 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#157 0x755bee in SFS_ArrayDeref /programs/mp4box/builds/build6/src/bifs/script_dec.c:693:2
#158 0x755bee in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:504:3
#159 0x7561e1 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:568:3
#160 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#161 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#162 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#163 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#164 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#165 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#166 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#167 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#168 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#169 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#170 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#171 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#172 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#173 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#174 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#175 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#176 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#177 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#178 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#179 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#180 0x755f63 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:658:3
#181 0x756174 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:608:3
#182 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#183 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#184 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#185 0x7562d1 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:633:3
#186 0x755f84 in SFS_ObjectMethodCall /programs/mp4box/builds/build6/src/bifs/script_dec.c:720:2
#187 0x755f84 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:501:3
#188 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#189 0x756038 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:603:3
#190 0x755dac in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:593:3
#191 0x756174 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:608:3
#192 0x755bbe in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:638:3
#193 0x7562d1 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:633:3
#194 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#195 0x756241 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:613:3
#196 0x755b8e in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:523:3
#197 0x7562e9 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:538:3
#198 0x756259 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:548:3
#199 0x756211 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:628:3
#200 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#201 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#202 0x7562b9 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:513:3
#203 0x755c35 in SFS_ObjectMemberAccess /programs/mp4box/builds/build6/src/bifs/script_dec.c:711:2
#204 0x755c35 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:498:3
#205 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#206 0x755c5d in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:573:3
#207 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#208 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#209 0x755bd6 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:578:3
#210 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#211 0x755bbe in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:638:3
#212 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#213 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#214 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#215 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#216 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#217 0x7561c9 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:588:3
#218 0x755bbe in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:638:3
#219 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#220 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#221 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#222 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#223 0x755c5d in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:573:3
#224 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#225 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#226 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#227 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#228 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#229 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#230 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#231 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#232 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#233 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#234 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#235 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#236 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#237 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#238 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#239 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#240 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#241 0x755bee in SFS_ArrayDeref /programs/mp4box/builds/build6/src/bifs/script_dec.c:693:2
#242 0x755bee in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:504:3
#243 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#244 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#245 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#246 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#247 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#248 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#249 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#250 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#251 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
#252 0x756086 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c
#253 0x7551a7 in SFS_CompoundExpression /programs/mp4box/builds/build6/src/bifs/script_dec.c:419:2
#254 0x755a15 in SFS_Expression /programs/mp4box/builds/build6/src/bifs/script_dec.c:442:3
SUMMARY: AddressSanitizer: stack-overflow (/programs/mp4box/builds/build6/bin/gcc/MP4Box+0x430a83) in strlen
==29792==ABORTING
/collect/collec.sh: line 18: 29792 Aborted (core dumped)
------------------------
``` | There is a stack-overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2091/comments | 0 | 2022-02-01T08:25:03Z | 2022-02-01T14:29:21Z | https://github.com/gpac/gpac/issues/2091 | 1,120,365,859 | 2,091 |
[
"gpac",
"gpac"
] | ## Description
There is a segment fault detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1687-g16bd902cb-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -isma -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/7976887/poc.zip)
## Crash output
```
==31085==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x0000008f9ad2 bp 0x7ffe1f847890 sp 0x7ffe1f8474a0 T0)
==31085==The signal is caused by a READ memory access.
==31085==Hint: address points to the zero page.
#0 0x8f9ad2 in gf_media_make_isma /programs/mp4box/builds/build6/src/media_tools/isom_tools.c:591:66
#1 0x4e4934 in mp4boxMain /programs/mp4box/builds/build6/applications/mp4box/main.c:6332:8
#2 0x7f086dc130b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#3 0x41ea6d in _start (/programs/mp4box/builds/build6/bin/gcc/MP4Box+0x41ea6d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /programs/mp4box/builds/build6/src/media_tools/isom_tools.c:591:66 in gf_media_make_isma
==31085==ABORTING
/collect/collec.sh: line 18: 31085 Aborted (core dumped)
------------------------
``` | There is a segment fault detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2090/comments | 0 | 2022-02-01T08:23:09Z | 2022-02-01T14:29:21Z | https://github.com/gpac/gpac/issues/2090 | 1,120,364,312 | 2,090 |
[
"gpac",
"gpac"
] | ## Description
There is a segment fault detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1687-g16bd902cb-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -frag 1 -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/7976877/poc.zip)
## Crash output
```
==15641==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x000000d776b8 bp 0x7ffea0e4f210 sp 0x7ffea0e4f0a0 T0)
==15641==The signal is caused by a READ memory access.
==15641==Hint: address points to the zero page.
#0 0xd776b8 in mp4_mux_cenc_update /programs/mp4box/builds/build6/src/filters/mux_isom.c:3582:184
#1 0xd6ab36 in mp4_mux_config_timing /programs/mp4box/builds/build6/src/filters/mux_isom.c:5863:6
#2 0xd6ab36 in mp4_mux_process /programs/mp4box/builds/build6/src/filters/mux_isom.c:6033:3
#3 0xb7c2ae in gf_filter_process_task /programs/mp4box/builds/build6/src/filter_core/filter.c:2515:7
#4 0xb5d7eb in gf_fs_thread_proc /programs/mp4box/builds/build6/src/filter_core/filter_session.c:1756:3
#5 0xb5c694 in gf_fs_run /programs/mp4box/builds/build6/src/filter_core/filter_session.c:2000:2
#6 0x910850 in gf_media_fragment_file /programs/mp4box/builds/build6/src/media_tools/isom_tools.c:3816:6
#7 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build6/applications/mp4box/main.c:6455:7
#8 0x7ff7959040b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#9 0x41ea6d in _start (/programs/mp4box/builds/build6/bin/gcc/MP4Box+0x41ea6d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /programs/mp4box/builds/build6/src/filters/mux_isom.c:3582:184 in mp4_mux_cenc_update
==15641==ABORTING
/collect/collec.sh: line 18: 15641 Aborted(core dumped)
------------------------
``` | There is a segment fault detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2089/comments | 0 | 2022-02-01T08:21:39Z | 2022-02-01T14:29:20Z | https://github.com/gpac/gpac/issues/2089 | 1,120,363,059 | 2,089 |
[
"gpac",
"gpac"
] | ## Description
There is a segment fault detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1687-g16bd902cb-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -frag 1 -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/7976870/poc.zip)
## Crash output
```
==15501==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000007ea282 bp 0x7ffc1a6c8090 sp 0x7ffc1a6c8080 T0)
==15501==The signal is caused by a READ memory access.
==15501==Hint: address points to the zero page.
#0 0x7ea282 in gf_isom_get_media_data_size /programs/mp4box/builds/build6/src/isomedia/isom_read.c:3890:46
#1 0x156a8a6 in isor_declare_track /programs/mp4box/builds/build6/src/filters/isoffin_load.c:637:70
#2 0x1576c07 in isor_declare_objects /programs/mp4box/builds/build6/src/filters/isoffin_load.c:1446:3
#3 0xcfd23d in isoffin_initialize /programs/mp4box/builds/build6/src/filters/isoffin_read.c:485:8
#4 0xb70f63 in gf_filter_new_finalize /programs/mp4box/builds/build6/src/filter_core/filter.c:429:8
#5 0xb6f83c in gf_filter_new /programs/mp4box/builds/build6/src/filter_core/filter.c:383:7
#6 0xb5b5fe in gf_fs_load_filter_internal /programs/mp4box/builds/build6/src/filter_core/filter_session.c:1250:13
#7 0x910798 in gf_media_fragment_file /programs/mp4box/builds/build6/src/media_tools/isom_tools.c:3784:6
#8 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build6/applications/mp4box/main.c:6455:7
#9 0x7fc6744d50b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#10 0x41ea6d in _start (/programs/mp4box/builds/build6/bin/gcc/MP4Box+0x41ea6d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /programs/mp4box/builds/build6/src/isomedia/isom_read.c:3890:46 in gf_isom_get_media_data_size
==15501==ABORTING
``` | There is a segment fault detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2088/comments | 0 | 2022-02-01T08:20:09Z | 2022-02-01T14:29:20Z | https://github.com/gpac/gpac/issues/2088 | 1,120,361,825 | 2,088 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1687-g16bd902cb-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -dxml -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/7976849/poc.zip)
## Crash output
```
==18134==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000eda at pc 0x000000cdd403 bp 0x7ffc94991ef0 sp 0x7ffc94991ee8
READ of size 1 at 0x611000000eda thread T0
#0 0xcdd402 in gf_inspect_dump_nalu_internal /programs/mp4box/builds/build6/src/filters/inspect.c:1164:24
#1 0xcd734f in gf_inspect_dump_nalu /programs/mp4box/builds/build6/src/filters/inspect.c:1206:2
#2 0x4f45e3 in dump_isom_nal_ex /programs/mp4box/builds/build6/applications/mp4box/filedump.c:1288:5
#3 0x4f8170 in dump_isom_xml /programs/mp4box/builds/build6/applications/mp4box/filedump.c:2001:9
#4 0x4e0da8 in mp4boxMain /programs/mp4box/builds/build6/applications/mp4box/main.c:6171:7
#5 0x7fec5aea30b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#6 0x41ea6d in _start (/programs/mp4box/builds/build6/bin/gcc/MP4Box+0x41ea6d)
0x611000000eda is located 0 bytes to the right of 218-byte region [0x611000000e00,0x611000000eda)
allocated by thread T0 here:
#0 0x499ccd in malloc (/programs/mp4box/builds/build6/bin/gcc/MP4Box+0x499ccd)
#1 0x841999 in Media_GetSample /programs/mp4box/builds/build6/src/isomedia/media.c:625:29
#2 0x7d9e90 in gf_isom_get_sample_ex /programs/mp4box/builds/build6/src/isomedia/isom_read.c:1905:6
#3 0x4f40a0 in dump_isom_nal_ex /programs/mp4box/builds/build6/applications/mp4box/filedump.c:1234:24
#4 0x4f8170 in dump_isom_xml /programs/mp4box/builds/build6/applications/mp4box/filedump.c:2001:9
#5 0x4e0da8 in mp4boxMain /programs/mp4box/builds/build6/applications/mp4box/main.c:6171:7
#6 0x7fec5aea30b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow /programs/mp4box/builds/build6/src/filters/inspect.c:1164:24 in gf_inspect_dump_nalu_internal
Shadow bytes around the buggy address:
0x0c227fff8180: fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa fa
0x0c227fff8190: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd
0x0c227fff81a0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c227fff81b0: fd fd fd fd fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff81c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c227fff81d0: 00 00 00 00 00 00 00 00 00 00 00[02]fa fa fa fa
0x0c227fff81e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff81f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==18134==ABORTING
/collect/collec.sh: line 18: 18134 Aborted (core dumped)
------------------------
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2087/comments | 0 | 2022-02-01T08:18:23Z | 2022-02-01T14:29:19Z | https://github.com/gpac/gpac/issues/2087 | 1,120,360,448 | 2,087 |
[
"gpac",
"gpac"
] | ## Description
There is a heap buffer overflow detected by AddressSanitizer
## System info
```
Ubuntu 20.04.2 LTS
clang version 12.0.0-++20210402082642+04ba60cfe598-1~exp1~20210402063359.71
MP4Box - GPAC version 1.1.0-DEV-rev1687-g16bd902cb-master
```
## Build command
```
./configure --static-mp4box --prefix=`realpath ./install` --enable-sanitizer --cc=clang --cxx=clang++
```
## crash command
```
MP4Box -frag 1 -out /dev/null poc_file
```
## Pocs
[poc.zip](https://github.com/gpac/gpac/files/7976839/poc.zip)
## Crash output
```
==21109==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000001f18 at pc 0x0000008236c0 bp 0x7fff8b60e4b0 sp 0x7fff8b60e4a8
WRITE of size 2 at 0x606000001f18 thread T0
#0 0x8236bf in gf_isom_clone_sample_description /programs/mp4box/builds/build6/src/isomedia/isom_write.c:4355:51
#1 0xd774b5 in mp4_mux_cenc_update /programs/mp4box/builds/build6/src/filters/mux_isom.c:3564:8
#2 0xd6ab36 in mp4_mux_config_timing /programs/mp4box/builds/build6/src/filters/mux_isom.c:5863:6
#3 0xd6ab36 in mp4_mux_process /programs/mp4box/builds/build6/src/filters/mux_isom.c:6033:3
#4 0xb7c2ae in gf_filter_process_task /programs/mp4box/builds/build6/src/filter_core/filter.c:2515:7
#5 0xb5d7eb in gf_fs_thread_proc /programs/mp4box/builds/build6/src/filter_core/filter_session.c:1756:3
#6 0xb5c694 in gf_fs_run /programs/mp4box/builds/build6/src/filter_core/filter_session.c:2000:2
#7 0x910850 in gf_media_fragment_file /programs/mp4box/builds/build6/src/media_tools/isom_tools.c:3816:6
#8 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build6/applications/mp4box/main.c:6455:7
#9 0x7fdce2d3b0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#10 0x41ea6d in _start (/programs/mp4box/builds/build6/bin/gcc/MP4Box+0x41ea6d)
0x606000001f18 is located 0 bytes to the right of 56-byte region [0x606000001ee0,0x606000001f18)
allocated by thread T0 here:
#0 0x499ccd in malloc (/programs/mp4box/builds/build6/bin/gcc/MP4Box+0x499ccd)
#1 0x12c089f in unkn_box_new /programs/mp4box/builds/build6/src/isomedia/box_code_base.c:804:2
#2 0x7af0c1 in gf_isom_box_new_ex /programs/mp4box/builds/build6/src/isomedia/box_funcs.c:1677:17
#3 0x7ad48d in gf_isom_box_parse_ex /programs/mp4box/builds/build6/src/isomedia/box_funcs.c:240:12
#4 0x823151 in gf_isom_clone_sample_description /programs/mp4box/builds/build6/src/isomedia/isom_write.c:4336:6
#5 0xd774b5 in mp4_mux_cenc_update /programs/mp4box/builds/build6/src/filters/mux_isom.c:3564:8
#6 0xd6ab36 in mp4_mux_config_timing /programs/mp4box/builds/build6/src/filters/mux_isom.c:5863:6
#7 0xd6ab36 in mp4_mux_process /programs/mp4box/builds/build6/src/filters/mux_isom.c:6033:3
#8 0xb7c2ae in gf_filter_process_task /programs/mp4box/builds/build6/src/filter_core/filter.c:2515:7
#9 0xb5d7eb in gf_fs_thread_proc /programs/mp4box/builds/build6/src/filter_core/filter_session.c:1756:3
#10 0xb5c694 in gf_fs_run /programs/mp4box/builds/build6/src/filter_core/filter_session.c:2000:2
#11 0x910850 in gf_media_fragment_file /programs/mp4box/builds/build6/src/media_tools/isom_tools.c:3816:6
#12 0x4e6fcc in mp4boxMain /programs/mp4box/builds/build6/applications/mp4box/main.c:6455:7
#13 0x7fdce2d3b0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow /programs/mp4box/builds/build6/src/isomedia/isom_write.c:4355:51 in gf_isom_clone_sample_description
Shadow bytes around the buggy address:
0x0c0c7fff8390: fa fa fa fa 00 00 00 00 00 00 00 fa fa fa fa fa
0x0c0c7fff83a0: fd fd fd fd fd fd fd fd fa fa fa fa fd fd fd fd
0x0c0c7fff83b0: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fd
0x0c0c7fff83c0: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa
0x0c0c7fff83d0: 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 00 00
=>0x0c0c7fff83e0: 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0c7fff83f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0c7fff8400: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0c7fff8410: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0c7fff8420: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0c7fff8430: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==21109==ABORTING
------------------------
``` | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2086/comments | 0 | 2022-02-01T08:16:21Z | 2022-02-01T14:29:19Z | https://github.com/gpac/gpac/issues/2086 | 1,120,358,857 | 2,086 |
[
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...).
Hello,
I am following example [here](https://github.com/gpac/testsuite/blob/filters/media/python/dash_bind.py) to extend the DASH algorithm. I am aware that I could change the bitrate to fit into the bandwidth conditions.
Unfortunately, I cannot find option to drop (not to download) certain tiles.
Does the python API support dropping tiles ? Or is there any alternative?
GPAC version: version 1.1.0-DEV-rev1555-g339e7a736-master
Thank you, | Support drop tile for python API | https://api.github.com/repos/gpac/gpac/issues/2084/comments | 1 | 2022-01-29T22:36:47Z | 2022-02-01T10:12:35Z | https://github.com/gpac/gpac/issues/2084 | 1,118,343,754 | 2,084 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.