diff options
author | Tanu Kaskinen <tanuk@iki.fi> | 2018-03-20 10:50:22 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-03-25 09:40:41 +0100 |
commit | d345c67168805e75938572a35d4f69236bfd8cb9 (patch) | |
tree | cef5f1cb38669b69dc7f499f92d5c6e2c84d134b /meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb | |
parent | be7511a33deb7c7eb38760ca60564da42c79d41e (diff) | |
download | poky-d345c67168805e75938572a35d4f69236bfd8cb9.tar.gz |
libvorbis: CVE-2017-14633
In Xiph.Org libvorbis 1.3.5, an out-of-bounds array read vulnerability
exists in the function mapping0_forward() in mapping0.c, which may lead
to DoS when operating on a crafted audio file with vorbis_analysis().
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14633
(From OE-Core rev: db6c0df30acdb9973f9bd4297a5fce4725c0720d)
Signed-off-by: Tanu Kaskinen <tanuk@iki.fi>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb')
-rw-r--r-- | meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb b/meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb index 56c5b0a9cb..73f9d1af2c 100644 --- a/meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb +++ b/meta/recipes-multimedia/libvorbis/libvorbis_1.3.5.bb | |||
@@ -12,6 +12,7 @@ DEPENDS = "libogg" | |||
12 | 12 | ||
13 | SRC_URI = "http://downloads.xiph.org/releases/vorbis/${BP}.tar.xz \ | 13 | SRC_URI = "http://downloads.xiph.org/releases/vorbis/${BP}.tar.xz \ |
14 | file://0001-configure-Check-for-clang.patch \ | 14 | file://0001-configure-Check-for-clang.patch \ |
15 | file://CVE-2017-14633.patch \ | ||
15 | " | 16 | " |
16 | SRC_URI[md5sum] = "28cb28097c07a735d6af56e598e1c90f" | 17 | SRC_URI[md5sum] = "28cb28097c07a735d6af56e598e1c90f" |
17 | SRC_URI[sha256sum] = "54f94a9527ff0a88477be0a71c0bab09a4c3febe0ed878b24824906cd4b0e1d1" | 18 | SRC_URI[sha256sum] = "54f94a9527ff0a88477be0a71c0bab09a4c3febe0ed878b24824906cd4b0e1d1" |