summaryrefslogtreecommitdiffstats
path: root/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2017-14169.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2017-14169.patch')
-rw-r--r--meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2017-14169.patch39
1 files changed, 39 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2017-14169.patch b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2017-14169.patch
new file mode 100644
index 0000000000..e1284faa93
--- /dev/null
+++ b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2017-14169.patch
@@ -0,0 +1,39 @@
1From 9d00fb9d70ee8c0cc7002b89318c5be00f1bbdad Mon Sep 17 00:00:00 2001
2From: =?UTF-8?q?=E5=AD=99=E6=B5=A9=28=E6=99=93=E9=BB=91=29?=
3 <tony.sh@alibaba-inc.com>
4Date: Tue, 29 Aug 2017 23:59:21 +0200
5Subject: [PATCH] avformat/mxfdec: Fix Sign error in mxf_read_primer_pack()
6MIME-Version: 1.0
7Content-Type: text/plain; charset=UTF-8
8Content-Transfer-Encoding: 8bit
9
10Fixes: 20170829B.mxf
11
12Co-Author: 张洪亮(望初)" <wangchu.zhl@alibaba-inc.com>
13Found-by: Xiaohei and Wangchu from Alibaba Security Team
14Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
15
16CVE: CVE-2017-14169
17Upstream-Status: Backport
18
19Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
20---
21 libavformat/mxfdec.c | 2 +-
22 1 file changed, 1 insertion(+), 1 deletion(-)
23
24diff --git a/libavformat/mxfdec.c b/libavformat/mxfdec.c
25index 6adb77d..91731a7 100644
26--- a/libavformat/mxfdec.c
27+++ b/libavformat/mxfdec.c
28@@ -500,7 +500,7 @@ static int mxf_read_primer_pack(void *arg, AVIOContext *pb, int tag, int size, U
29 avpriv_request_sample(pb, "Primer pack item length %d", item_len);
30 return AVERROR_PATCHWELCOME;
31 }
32- if (item_num > 65536) {
33+ if (item_num > 65536 || item_num < 0) {
34 av_log(mxf->fc, AV_LOG_ERROR, "item_num %d is too large\n", item_num);
35 return AVERROR_INVALIDDATA;
36 }
37--
382.1.0
39