From 34e1e94df17de5a5263a50a80f8f4abd65f9e1d2 Mon Sep 17 00:00:00 2001 From: Yue Tao Date: Sun, 27 Apr 2014 19:51:12 +0800 Subject: gst-ffmpeg: fix for Security Advisory CVE-2013-0851 The decode_frame function in libavcodec/eamad.c in FFmpeg before 1.1 allows remote attackers to have an unspecified impact via crafted Electronic Arts Madcow video data, which triggers an out-of-bounds array access. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0851 (From OE-Core rev: 8c9868d074f5d09022efc9419ee09eb805f68394) Signed-off-by: Yue Tao Signed-off-by: Roy Li Signed-off-by: Saul Wold Signed-off-by: Richard Purdie --- .../0001-eamad-fix-out-of-array-accesses.patch | 29 ++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 meta/recipes-multimedia/gstreamer/gst-ffmpeg-0.10.13/0001-eamad-fix-out-of-array-accesses.patch (limited to 'meta/recipes-multimedia/gstreamer/gst-ffmpeg-0.10.13') diff --git a/meta/recipes-multimedia/gstreamer/gst-ffmpeg-0.10.13/0001-eamad-fix-out-of-array-accesses.patch b/meta/recipes-multimedia/gstreamer/gst-ffmpeg-0.10.13/0001-eamad-fix-out-of-array-accesses.patch new file mode 100644 index 0000000000..f45e3fd59d --- /dev/null +++ b/meta/recipes-multimedia/gstreamer/gst-ffmpeg-0.10.13/0001-eamad-fix-out-of-array-accesses.patch @@ -0,0 +1,29 @@ +From 63ac64864c6e0e84355aa3caa5b92208997a9a8d Mon Sep 17 00:00:00 2001 +From: Michael Niedermayer +Date: Sat, 17 Nov 2012 16:26:55 +0100 +Subject: [PATCH] eamad: fix out of array accesses + +Upstream-Status: Backport + +Commit 63ac64864c6e0e84355aa3caa5b92208997a9a8d release/1.1 + +Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind +Signed-off-by: Michael Niedermayer +--- + libavcodec/eamad.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/libavcodec/eamad.c b/libavcodec/eamad.c +index 2805195..e38650e 100644 +--- a/gst-libs/ext/libav/libavcodec/eamad.c ++++ b/gst-libs/ext/libav/libavcodec/eamad.c +@@ -237,7 +237,7 @@ static int decode_frame(AVCodecContext *avctx, + int chunk_type; + int inter; + +- if (buf_size < 17) { ++ if (buf_size < 26) { + av_log(avctx, AV_LOG_ERROR, "Input buffer too small\n"); + *data_size = 0; + return -1; +-- -- cgit v1.2.3-54-g00ecf