diff options
author | Tanu Kaskinen <tanuk@iki.fi> | 2018-03-20 10:50:24 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-03-25 09:40:42 +0100 |
commit | 21c85626a5fd5dd7ab4968054de0eaf32c20158b (patch) | |
tree | 08ffd986743ebc4c859dfe0cc797ed88e8a411e5 /meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb | |
parent | 399200d3a37dda6ad445612ea51ba52134f22561 (diff) | |
download | poky-21c85626a5fd5dd7ab4968054de0eaf32c20158b.tar.gz |
libvorbis: CVE-2018-5146
Prevent out-of-bounds write in codebook decoding. The bug could allow
code execution from a specially crafted Ogg Vorbis file.
References:
https://www.debian.org/security/2018/dsa-4140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146
(From OE-Core rev: 1f01ce76c76d63f5ffe96baf518e670ae01c4d12)
Signed-off-by: Tanu Kaskinen <tanuk@iki.fi>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb')
-rw-r--r-- | meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb b/meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb index 32e92f009a..20f887c252 100644 --- a/meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb +++ b/meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb | |||
@@ -14,6 +14,7 @@ SRC_URI = "http://downloads.xiph.org/releases/vorbis/${BP}.tar.xz \ | |||
14 | file://0001-configure-Check-for-clang.patch \ | 14 | file://0001-configure-Check-for-clang.patch \ |
15 | file://CVE-2017-14633.patch \ | 15 | file://CVE-2017-14633.patch \ |
16 | file://CVE-2017-14632.patch \ | 16 | file://CVE-2017-14632.patch \ |
17 | file://CVE-2018-5146.patch \ | ||
17 | " | 18 | " |
18 | SRC_URI[md5sum] = "28cb28097c07a735d6af56e598e1c90f" | 19 | SRC_URI[md5sum] = "28cb28097c07a735d6af56e598e1c90f" |
19 | SRC_URI[sha256sum] = "54f94a9527ff0a88477be0a71c0bab09a4c3febe0ed878b24824906cd4b0e1d1" | 20 | SRC_URI[sha256sum] = "54f94a9527ff0a88477be0a71c0bab09a4c3febe0ed878b24824906cd4b0e1d1" |