diff options
author | Ming Liu <ming.liu@windriver.com> | 2013-11-21 01:05:05 -0600 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2013-12-12 22:17:33 +0000 |
commit | 1d31f44f8cf213a5174e2d3b31a7dd7b10c798ee (patch) | |
tree | 61ed846999a4c11773be84f99010e701f360a5b1 /meta | |
parent | 90f366ec750b9a7f1e68bae81aa4e52028550d30 (diff) | |
download | poky-1d31f44f8cf213a5174e2d3b31a7dd7b10c798ee.tar.gz |
gst-ffmpeg: fix CVE-2013-3674
The cdg_decode_frame function in cdgraphics.c in libavcodec in FFmpeg before
1.2.1 does not validate the presence of non-header data in a buffer, which
allows remote attackers to cause a denial of service (out-of-bounds array
access and application crash) via crafted CD Graphics Video data.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3674
(From OE-Core master rev: f1721553a873b242bc26ad3e4d618aea39dfd507)
(From OE-Core rev: 23f323b80cbef122a4ed0897dfff54bb1b0b8ec0)
Signed-off-by: Ming Liu <ming.liu@windriver.com>
Signed-off-by: Jeff Polk <jeff.polk@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r-- | meta/recipes-multimedia/gstreamer/gst-ffmpeg-0.10.13/gst-ffmpeg-CVE-2013-3674.patch | 26 | ||||
-rw-r--r-- | meta/recipes-multimedia/gstreamer/gst-ffmpeg_0.10.13.bb | 1 |
2 files changed, 27 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/gstreamer/gst-ffmpeg-0.10.13/gst-ffmpeg-CVE-2013-3674.patch b/meta/recipes-multimedia/gstreamer/gst-ffmpeg-0.10.13/gst-ffmpeg-CVE-2013-3674.patch new file mode 100644 index 0000000000..a28404b072 --- /dev/null +++ b/meta/recipes-multimedia/gstreamer/gst-ffmpeg-0.10.13/gst-ffmpeg-CVE-2013-3674.patch | |||
@@ -0,0 +1,26 @@ | |||
1 | avcodec/cdgraphics: check buffer size before use | ||
2 | |||
3 | Fixes out of array accesses | ||
4 | |||
5 | Backported from:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=ad002e1a13a8df934bd6cb2c84175a4780ab8942 | ||
6 | |||
7 | Upstream-status: Backport | ||
8 | |||
9 | Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind | ||
10 | Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | ||
11 | Signed-off-by: Ming Liu <ming.liu@windriver.com> | ||
12 | |||
13 | diff -urpN a/gst-libs/ext/libav/libavcodec/cdgraphics.c b/gst-libs/ext/libav/libavcodec/cdgraphics.c | ||
14 | --- a/gst-libs/ext/libav/libavcodec/cdgraphics.c 2013-07-18 13:17:08.399876575 +0800 | ||
15 | +++ b/gst-libs/ext/libav/libavcodec/cdgraphics.c 2013-07-18 13:18:05.880502267 +0800 | ||
16 | @@ -291,7 +291,9 @@ static int cdg_decode_frame(AVCodecConte | ||
17 | inst = bytestream_get_byte(&buf); | ||
18 | inst &= CDG_MASK; | ||
19 | buf += 2; /// skipping 2 unneeded bytes | ||
20 | - bytestream_get_buffer(&buf, cdg_data, buf_size - CDG_HEADER_SIZE); | ||
21 | + | ||
22 | + if (buf_size > CDG_HEADER_SIZE) | ||
23 | + bytestream_get_buffer(&buf, cdg_data, buf_size - CDG_HEADER_SIZE); | ||
24 | |||
25 | if ((command & CDG_MASK) == CDG_COMMAND) { | ||
26 | switch (inst) { | ||
diff --git a/meta/recipes-multimedia/gstreamer/gst-ffmpeg_0.10.13.bb b/meta/recipes-multimedia/gstreamer/gst-ffmpeg_0.10.13.bb index 2107704618..2dd5b699bd 100644 --- a/meta/recipes-multimedia/gstreamer/gst-ffmpeg_0.10.13.bb +++ b/meta/recipes-multimedia/gstreamer/gst-ffmpeg_0.10.13.bb | |||
@@ -21,6 +21,7 @@ SRC_URI = "http://gstreamer.freedesktop.org/src/${BPN}/${BPN}-${PV}.tar.bz2 \ | |||
21 | file://configure-fix.patch \ | 21 | file://configure-fix.patch \ |
22 | file://h264_qpel_mmx.patch \ | 22 | file://h264_qpel_mmx.patch \ |
23 | file://libav_e500mc.patch \ | 23 | file://libav_e500mc.patch \ |
24 | file://gst-ffmpeg-CVE-2013-3674.patch \ | ||
24 | " | 25 | " |
25 | 26 | ||
26 | SRC_URI[md5sum] = "7f5beacaf1312db2db30a026b36888c4" | 27 | SRC_URI[md5sum] = "7f5beacaf1312db2db30a026b36888c4" |