diff options
| author | Peter Marko <peter.marko@siemens.com> | 2024-12-24 13:44:16 +0100 | 
|---|---|---|
| committer | Khem Raj <raj.khem@gmail.com> | 2024-12-24 08:23:09 -0800 | 
| commit | 95b8d055db83af01aed7f6ab98bc08cfa576f15b (patch) | |
| tree | 9f9c8e0f91e977182aac8f4618bf2f3971ba1eb2 | |
| parent | c048c0410133241b2cfbb3d2cbeb532afff99e58 (diff) | |
| download | meta-openembedded-95b8d055db83af01aed7f6ab98bc08cfa576f15b.tar.gz | |
opusfile: patch CVE-2022-47021
This patch is mentioned in [1] and [2].
[1] https://nvd.nist.gov/vuln/detail/CVE-2022-47021
[2] https://github.com/xiph/opusfile/issues/36
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
| -rw-r--r-- | meta-multimedia/recipes-multimedia/opusfile/opusfile/CVE-2022-47021.patch | 44 | ||||
| -rw-r--r-- | meta-multimedia/recipes-multimedia/opusfile/opusfile_0.12.bb | 2 | 
2 files changed, 46 insertions, 0 deletions
| diff --git a/meta-multimedia/recipes-multimedia/opusfile/opusfile/CVE-2022-47021.patch b/meta-multimedia/recipes-multimedia/opusfile/opusfile/CVE-2022-47021.patch new file mode 100644 index 0000000000..48a7cab3f5 --- /dev/null +++ b/meta-multimedia/recipes-multimedia/opusfile/opusfile/CVE-2022-47021.patch | |||
| @@ -0,0 +1,44 @@ | |||
| 1 | From 0a4cd796df5b030cb866f3f4a5e41a4b92caddf5 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Ralph Giles <giles@thaumas.net> | ||
| 3 | Date: Tue, 6 Sep 2022 19:04:31 -0700 | ||
| 4 | Subject: [PATCH] Propagate allocation failure from ogg_sync_buffer. | ||
| 5 | |||
| 6 | Instead of segfault, report OP_EFAULT if ogg_sync_buffer returns | ||
| 7 | a null pointer. This allows more graceful recovery by the caller | ||
| 8 | in the unlikely event of a fallible ogg_malloc call. | ||
| 9 | |||
| 10 | We do check the return value elsewhere in the code, so the new | ||
| 11 | checks make the code more consistent. | ||
| 12 | |||
| 13 | Thanks to https://github.com/xiph/opusfile/issues/36 for reporting. | ||
| 14 | |||
| 15 | Signed-off-by: Timothy B. Terriberry <tterribe@xiph.org> | ||
| 16 | Signed-off-by: Mark Harris <mark.hsj@gmail.com> | ||
| 17 | |||
| 18 | CVE: CVE-2022-47021 | ||
| 19 | Upstream-Status: Backport [https://github.com/xiph/opusfile/commit/0a4cd796df5b030cb866f3f4a5e41a4b92caddf5] | ||
| 20 | Signed-off-by: Peter Marko <peter.marko@siemens.com> | ||
| 21 | --- | ||
| 22 | src/opusfile.c | 2 ++ | ||
| 23 | 1 file changed, 2 insertions(+) | ||
| 24 | |||
| 25 | diff --git a/src/opusfile.c b/src/opusfile.c | ||
| 26 | index ca219b2..3c3c81e 100644 | ||
| 27 | --- a/src/opusfile.c | ||
| 28 | +++ b/src/opusfile.c | ||
| 29 | @@ -148,6 +148,7 @@ static int op_get_data(OggOpusFile *_of,int _nbytes){ | ||
| 30 | int nbytes; | ||
| 31 | OP_ASSERT(_nbytes>0); | ||
| 32 | buffer=(unsigned char *)ogg_sync_buffer(&_of->oy,_nbytes); | ||
| 33 | + if(OP_UNLIKELY(buffer==NULL))return OP_EFAULT; | ||
| 34 | nbytes=(int)(*_of->callbacks.read)(_of->stream,buffer,_nbytes); | ||
| 35 | OP_ASSERT(nbytes<=_nbytes); | ||
| 36 | if(OP_LIKELY(nbytes>0))ogg_sync_wrote(&_of->oy,nbytes); | ||
| 37 | @@ -1527,6 +1528,7 @@ static int op_open1(OggOpusFile *_of, | ||
| 38 | if(_initial_bytes>0){ | ||
| 39 | char *buffer; | ||
| 40 | buffer=ogg_sync_buffer(&_of->oy,(long)_initial_bytes); | ||
| 41 | + if(OP_UNLIKELY(buffer==NULL))return OP_EFAULT; | ||
| 42 | memcpy(buffer,_initial_data,_initial_bytes*sizeof(*buffer)); | ||
| 43 | ogg_sync_wrote(&_of->oy,(long)_initial_bytes); | ||
| 44 | } | ||
| diff --git a/meta-multimedia/recipes-multimedia/opusfile/opusfile_0.12.bb b/meta-multimedia/recipes-multimedia/opusfile/opusfile_0.12.bb index c775cef5a1..9e1d80e8dd 100644 --- a/meta-multimedia/recipes-multimedia/opusfile/opusfile_0.12.bb +++ b/meta-multimedia/recipes-multimedia/opusfile/opusfile_0.12.bb | |||
| @@ -11,4 +11,6 @@ SRC_URI = "https://downloads.xiph.org/releases/opus/${BP}.tar.gz" | |||
| 11 | SRC_URI[md5sum] = "45e8c62f6cd413395223c82f06bfa8ec" | 11 | SRC_URI[md5sum] = "45e8c62f6cd413395223c82f06bfa8ec" | 
| 12 | SRC_URI[sha256sum] = "118d8601c12dd6a44f52423e68ca9083cc9f2bfe72da7a8c1acb22a80ae3550b" | 12 | SRC_URI[sha256sum] = "118d8601c12dd6a44f52423e68ca9083cc9f2bfe72da7a8c1acb22a80ae3550b" | 
| 13 | 13 | ||
| 14 | SRC_URI += "file://CVE-2022-47021.patch" | ||
| 15 | |||
| 14 | inherit autotools pkgconfig | 16 | inherit autotools pkgconfig | 
