diff options
author | Divyanshu Rathore <divyanshurathore2022@gmail.com> | 2025-05-21 13:29:45 +0530 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2025-06-02 07:12:34 -0700 |
commit | 51ae2b0ed0e9ec9bad7c529bc899fdb6cb9a8aa6 (patch) | |
tree | ae8684a96ee95545e2a1f5a2f500165149342798 | |
parent | 4d40c0f3553418b2260295f16205d4b111424404 (diff) | |
download | poky-51ae2b0ed0e9ec9bad7c529bc899fdb6cb9a8aa6.tar.gz |
ffmpeg: upgrade 6.1.1 -> 6.1.2
ffmpeg_6.1.2 is the newest available stable release for 6.1.
It introduces quite a few bug and CVE fixes, which should help all.
CVEs that are fixed in the upgrade:
CVE-2024-32230
CVE-2024-35366
CVE-2024-36613
CVE-2024-36616
CVE-2024-36617
CVE-2024-36619
CVE-2024-7055
During upgrade it was noticed that the CVE scan doesn't pick up the CVEs as unpatched
(CVE-2025-0518, CVE-2025-22919, CVE-2025-22921, CVE-2025-25473,
CVE-2024-36618, CVE-2024-35369, CVE-2024-35368, CVE-2024-35367,
CVE-2024-35365, CVE-2024-28661, CVE-2023-50007, CVE-2023-49528,
CVE-2023-49501), due to improper versioning in NVD,
they are affecting 6.1.2 and hence we are leaving the patches in.
check the changelog mention below for information about fixes.
changelog: https://git.ffmpeg.org/gitweb/ffmpeg.git/shortlog/n6.1.2
This upgrade fixes CVE's hence remove those patches.
Refresh vulkan_av1_stable_API.patch as per new codebase.
(From OE-Core rev: 57e25585abf34677451c68d581374245e5b4b418)
Signed-off-by: Divyanshu Rathore <divyanshurathore2022@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r-- | meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-32230.patch | 36 | ||||
-rw-r--r-- | meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-35366.patch | 35 | ||||
-rw-r--r-- | meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36613.patch | 37 | ||||
-rw-r--r-- | meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36616.patch | 35 | ||||
-rw-r--r-- | meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36617.patch | 36 | ||||
-rw-r--r-- | meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36619.patch | 36 | ||||
-rw-r--r-- | meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-7055.patch | 38 | ||||
-rw-r--r-- | meta/recipes-multimedia/ffmpeg/ffmpeg/vulkan_av1_stable_API.patch | 40 | ||||
-rw-r--r-- | meta/recipes-multimedia/ffmpeg/ffmpeg_6.1.2.bb (renamed from meta/recipes-multimedia/ffmpeg/ffmpeg_6.1.1.bb) | 9 |
9 files changed, 21 insertions, 281 deletions
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-32230.patch b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-32230.patch deleted file mode 100644 index 0f30c9ecf5..0000000000 --- a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-32230.patch +++ /dev/null | |||
@@ -1,36 +0,0 @@ | |||
1 | From 96449cfeaeb95fcfd7a2b8d9ccf7719e97471ed1 Mon Sep 17 00:00:00 2001 | ||
2 | From: Michael Niedermayer <michael@niedermayer.cc> | ||
3 | Date: Mon, 8 Apr 2024 18:38:42 +0200 | ||
4 | Subject: [PATCH] avcodec/mpegvideo_enc: Fix 1 line and one column images | ||
5 | |||
6 | Fixes: Ticket10952 | ||
7 | Fixes: poc21ffmpeg | ||
8 | Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ||
9 | |||
10 | CVE: CVE-2024-32230 | ||
11 | |||
12 | Upstream-Status: Backport [https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=96449cfeaeb95fcfd7a2b8d9ccf7719e97471ed1] | ||
13 | |||
14 | Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> | ||
15 | --- | ||
16 | libavcodec/mpegvideo_enc.c | 4 ++-- | ||
17 | 1 file changed, 2 insertions(+), 2 deletions(-) | ||
18 | |||
19 | diff --git a/libavcodec/mpegvideo_enc.c b/libavcodec/mpegvideo_enc.c | ||
20 | index e460ca4..fb4aaa2 100644 | ||
21 | --- a/libavcodec/mpegvideo_enc.c | ||
22 | +++ b/libavcodec/mpegvideo_enc.c | ||
23 | @@ -1198,8 +1198,8 @@ static int load_input_picture(MpegEncContext *s, const AVFrame *pic_arg) | ||
24 | int dst_stride = i ? s->uvlinesize : s->linesize; | ||
25 | int h_shift = i ? s->chroma_x_shift : 0; | ||
26 | int v_shift = i ? s->chroma_y_shift : 0; | ||
27 | - int w = s->width >> h_shift; | ||
28 | - int h = s->height >> v_shift; | ||
29 | + int w = AV_CEIL_RSHIFT(s->width , h_shift); | ||
30 | + int h = AV_CEIL_RSHIFT(s->height, v_shift); | ||
31 | const uint8_t *src = pic_arg->data[i]; | ||
32 | uint8_t *dst = pic->f->data[i]; | ||
33 | int vpad = 16; | ||
34 | -- | ||
35 | 2.40.0 | ||
36 | |||
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-35366.patch b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-35366.patch deleted file mode 100644 index f7f16a5b92..0000000000 --- a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-35366.patch +++ /dev/null | |||
@@ -1,35 +0,0 @@ | |||
1 | From 0bed22d597b78999151e3bde0768b7fe763fc2a6 Mon Sep 17 00:00:00 2001 | ||
2 | From: Michael Niedermayer <michael@niedermayer.cc> | ||
3 | Date: Tue, 26 Mar 2024 00:39:49 +0100 | ||
4 | Subject: [PATCH] avformat/sbgdec: Check for negative duration | ||
5 | |||
6 | Fixes: signed integer overflow: 9223372036854775807 - -8000000 cannot be represented in type 'long' | ||
7 | Fixes: 62276/clusterfuzz-testcase-minimized-ffmpeg_dem_SBG_fuzzer-5133181743136768 | ||
8 | |||
9 | Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg | ||
10 | Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ||
11 | |||
12 | CVE: CVE-2024-35366 | ||
13 | |||
14 | Upstream-Status: Backport [https://github.com/ffmpeg/ffmpeg/commit/0bed22d597b78999151e3bde0768b7fe763fc2a6] | ||
15 | |||
16 | Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> | ||
17 | --- | ||
18 | libavformat/sbgdec.c | 2 +- | ||
19 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
20 | |||
21 | diff --git a/libavformat/sbgdec.c b/libavformat/sbgdec.c | ||
22 | index b2662ea..281fe62 100644 | ||
23 | --- a/libavformat/sbgdec.c | ||
24 | +++ b/libavformat/sbgdec.c | ||
25 | @@ -386,7 +386,7 @@ static int parse_options(struct sbg_parser *p) | ||
26 | case 'L': | ||
27 | FORWARD_ERROR(parse_optarg(p, opt, &oarg)); | ||
28 | r = str_to_time(oarg.s, &p->scs.opt_duration); | ||
29 | - if (oarg.e != oarg.s + r) { | ||
30 | + if (oarg.e != oarg.s + r || p->scs.opt_duration < 0) { | ||
31 | snprintf(p->err_msg, sizeof(p->err_msg), | ||
32 | "syntax error for option -L"); | ||
33 | return AVERROR_INVALIDDATA; | ||
34 | -- | ||
35 | 2.40.0 | ||
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36613.patch b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36613.patch deleted file mode 100644 index 0061b7ad98..0000000000 --- a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36613.patch +++ /dev/null | |||
@@ -1,37 +0,0 @@ | |||
1 | From 50d8e4f27398fd5778485a827d7a2817921f8540 Mon Sep 17 00:00:00 2001 | ||
2 | From: Michael Niedermayer <michael@niedermayer.cc> | ||
3 | Date: Sat, 30 Sep 2023 00:51:29 +0200 | ||
4 | Subject: [PATCH] avformat/dxa: Adjust order of operations around block align | ||
5 | |||
6 | Fixes: 51896/clusterfuzz-testcase-minimized-ffmpeg_dem_DXA_fuzzer-5730576523198464 | ||
7 | Fixes: signed integer overflow: 2147483566 + 82 cannot be represented in type 'int' | ||
8 | |||
9 | Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg | ||
10 | Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ||
11 | (cherry picked from commit 50d8e4f27398fd5778485a827d7a2817921f8540) | ||
12 | Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ||
13 | |||
14 | CVE: CVE-2024-36613 | ||
15 | |||
16 | Upstream-Status: Backport [https://github.com/ffmpeg/ffmpeg/commit/50d8e4f27398fd5778485a827d7a2817921f8540] | ||
17 | |||
18 | Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> | ||
19 | --- | ||
20 | libavformat/dxa.c | 2 +- | ||
21 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
22 | |||
23 | diff --git a/libavformat/dxa.c b/libavformat/dxa.c | ||
24 | index 474b852..b4d9d00 100644 | ||
25 | --- a/libavformat/dxa.c | ||
26 | +++ b/libavformat/dxa.c | ||
27 | @@ -122,7 +122,7 @@ static int dxa_read_header(AVFormatContext *s) | ||
28 | if(ast->codecpar->block_align) { | ||
29 | if (c->bpc > INT_MAX - ast->codecpar->block_align + 1) | ||
30 | return AVERROR_INVALIDDATA; | ||
31 | - c->bpc = ((c->bpc + ast->codecpar->block_align - 1) / ast->codecpar->block_align) * ast->codecpar->block_align; | ||
32 | + c->bpc = ((c->bpc - 1 + ast->codecpar->block_align) / ast->codecpar->block_align) * ast->codecpar->block_align; | ||
33 | } | ||
34 | c->bytes_left = fsize; | ||
35 | c->wavpos = avio_tell(pb); | ||
36 | -- | ||
37 | 2.40.0 | ||
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36616.patch b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36616.patch deleted file mode 100644 index 3f02c45b33..0000000000 --- a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36616.patch +++ /dev/null | |||
@@ -1,35 +0,0 @@ | |||
1 | From 86f73277bf014e2ce36dd2594f1e0fb8b3bd6661 Mon Sep 17 00:00:00 2001 | ||
2 | From: Michael Niedermayer <michael@niedermayer.cc> | ||
3 | Date: Tue, 26 Mar 2024 01:00:13 +0100 | ||
4 | Subject: [PATCH] avformat/westwood_vqa: Fix 2g packets | ||
5 | |||
6 | Fixes: signed integer overflow: 2147483424 * 2 cannot be represented in type 'int' | ||
7 | Fixes: 62276/clusterfuzz-testcase-minimized-ffmpeg_dem_WSVQA_fuzzer-4576211411795968 | ||
8 | |||
9 | Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg | ||
10 | Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ||
11 | |||
12 | CVE: CVE-2024-36616 | ||
13 | |||
14 | Upstream-Status: Backport [https://github.com/ffmpeg/ffmpeg/commit/86f73277bf014e2ce36dd2594f1e0fb8b3bd6661] | ||
15 | |||
16 | Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> | ||
17 | --- | ||
18 | libavformat/westwood_vqa.c | 2 +- | ||
19 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
20 | |||
21 | diff --git a/libavformat/westwood_vqa.c b/libavformat/westwood_vqa.c | ||
22 | index 03b2d9e..024f5d3 100644 | ||
23 | --- a/libavformat/westwood_vqa.c | ||
24 | +++ b/libavformat/westwood_vqa.c | ||
25 | @@ -262,7 +262,7 @@ static int wsvqa_read_packet(AVFormatContext *s, | ||
26 | break; | ||
27 | case SND2_TAG: | ||
28 | /* 2 samples/byte, 1 or 2 samples per frame depending on stereo */ | ||
29 | - pkt->duration = (chunk_size * 2) / wsvqa->channels; | ||
30 | + pkt->duration = (chunk_size * 2LL) / wsvqa->channels; | ||
31 | break; | ||
32 | } | ||
33 | break; | ||
34 | -- | ||
35 | 2.40.0 | ||
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36617.patch b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36617.patch deleted file mode 100644 index 5d751213e3..0000000000 --- a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36617.patch +++ /dev/null | |||
@@ -1,36 +0,0 @@ | |||
1 | From d973fcbcc2f944752ff10e6a76b0b2d9329937a7 Mon Sep 17 00:00:00 2001 | ||
2 | From: Michael Niedermayer <michael@niedermayer.cc> | ||
3 | Date: Sat, 30 Sep 2023 00:38:17 +0200 | ||
4 | Subject: [PATCH] avformat/cafdec: dont seek beyond 64bit | ||
5 | |||
6 | Fixes: signed integer overflow: 64 + 9223372036854775807 cannot be represented in type 'long long' | ||
7 | Fixes: 51896/clusterfuzz-testcase-minimized-ffmpeg_dem_CAF_fuzzer-6418242730328064 | ||
8 | Fixes: 62276/clusterfuzz-testcase-minimized-ffmpeg_dem_CAF_fuzzer-6418242730328064 | ||
9 | |||
10 | Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg | ||
11 | Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ||
12 | |||
13 | CVE: CVE-2024-36617 | ||
14 | |||
15 | Upstream-Status: Backport [https://github.com/ffmpeg/ffmpeg/commit/d973fcbcc2f944752ff10e6a76b0b2d9329937a7] | ||
16 | |||
17 | Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> | ||
18 | --- | ||
19 | libavformat/cafdec.c | 2 +- | ||
20 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
21 | |||
22 | diff --git a/libavformat/cafdec.c b/libavformat/cafdec.c | ||
23 | index f5ba0f4..e92e327 100644 | ||
24 | --- a/libavformat/cafdec.c | ||
25 | +++ b/libavformat/cafdec.c | ||
26 | @@ -271,7 +271,7 @@ static int read_pakt_chunk(AVFormatContext *s, int64_t size) | ||
27 | } | ||
28 | } | ||
29 | |||
30 | - if (avio_tell(pb) - ccount > size) { | ||
31 | + if (avio_tell(pb) - ccount > size || size > INT64_MAX - ccount) { | ||
32 | av_log(s, AV_LOG_ERROR, "error reading packet table\n"); | ||
33 | return AVERROR_INVALIDDATA; | ||
34 | } | ||
35 | -- | ||
36 | 2.40.0 | ||
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36619.patch b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36619.patch deleted file mode 100644 index 63d08eabcc..0000000000 --- a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36619.patch +++ /dev/null | |||
@@ -1,36 +0,0 @@ | |||
1 | From 28c7094b25b689185155a6833caf2747b94774a4 Mon Sep 17 00:00:00 2001 | ||
2 | From: Michael Niedermayer <michael@niedermayer.cc> | ||
3 | Date: Thu, 4 Apr 2024 00:15:27 +0200 | ||
4 | Subject: [PATCH] avcodec/wavarc: fix signed integer overflow in block type | ||
5 | 6/19 | ||
6 | |||
7 | Fixes: signed integer overflow: -2088796289 + -91276551 cannot be represented in type 'int' | ||
8 | Fixes: 67772/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_WAVARC_fuzzer-6533568953122816 | ||
9 | |||
10 | Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg | ||
11 | Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ||
12 | |||
13 | CVE: CVE-2024-36619 | ||
14 | |||
15 | Upstream-Status: Backport [https://github.com/ffmpeg/ffmpeg/commit/28c7094b25b689185155a6833caf2747b94774a4] | ||
16 | |||
17 | Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> | ||
18 | --- | ||
19 | libavcodec/wavarc.c | 2 +- | ||
20 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
21 | |||
22 | diff --git a/libavcodec/wavarc.c b/libavcodec/wavarc.c | ||
23 | index 09ed4d4..51d91a4 100644 | ||
24 | --- a/libavcodec/wavarc.c | ||
25 | +++ b/libavcodec/wavarc.c | ||
26 | @@ -648,7 +648,7 @@ static int decode_5elp(AVCodecContext *avctx, | ||
27 | for (int o = 0; o < order; o++) | ||
28 | sum += s->filter[ch][o] * (unsigned)samples[n + 70 - o - 1]; | ||
29 | |||
30 | - samples[n + 70] += ac_out[n] + (sum >> 4); | ||
31 | + samples[n + 70] += ac_out[n] + (unsigned)(sum >> 4); | ||
32 | } | ||
33 | |||
34 | for (int n = 0; n < 70; n++) | ||
35 | -- | ||
36 | 2.40.0 | ||
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-7055.patch b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-7055.patch deleted file mode 100644 index afd857ceac..0000000000 --- a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-7055.patch +++ /dev/null | |||
@@ -1,38 +0,0 @@ | |||
1 | From 587acd0d4020859e67d1f07aeff2c885797ebcce Mon Sep 17 00:00:00 2001 | ||
2 | From: Michael Niedermayer <michael@niedermayer.cc> | ||
3 | Date: Thu, 18 Jul 2024 21:12:54 +0200 | ||
4 | Subject: [PATCH] avcodec/pnmdec: Use 64bit for input size check | ||
5 | |||
6 | Fixes: out of array read | ||
7 | Fixes: poc3 | ||
8 | |||
9 | Reported-by: VulDB CNA Team | ||
10 | Found-by: CookedMelon | ||
11 | Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ||
12 | (cherry picked from commit 3faadbe2a27e74ff5bb5f7904ec27bb1f5287dc8) | ||
13 | Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ||
14 | |||
15 | CVE: CVE-2024-7055 | ||
16 | |||
17 | Upstream-Status: Backport [https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=587acd0d4020859e67d1f07aeff2c885797ebcce] | ||
18 | |||
19 | Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> | ||
20 | --- | ||
21 | libavcodec/pnmdec.c | 2 +- | ||
22 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
23 | |||
24 | diff --git a/libavcodec/pnmdec.c b/libavcodec/pnmdec.c | ||
25 | index acd77ea..40cc2ae 100644 | ||
26 | --- a/libavcodec/pnmdec.c | ||
27 | +++ b/libavcodec/pnmdec.c | ||
28 | @@ -264,7 +264,7 @@ static int pnm_decode_frame(AVCodecContext *avctx, AVFrame *p, | ||
29 | break; | ||
30 | case AV_PIX_FMT_GBRPF32: | ||
31 | if (!s->half) { | ||
32 | - if (avctx->width * avctx->height * 12 > s->bytestream_end - s->bytestream) | ||
33 | + if (avctx->width * avctx->height * 12LL > s->bytestream_end - s->bytestream) | ||
34 | return AVERROR_INVALIDDATA; | ||
35 | scale = 1.f / s->scale; | ||
36 | if (s->endian) { | ||
37 | -- | ||
38 | 2.40.0 | ||
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg/vulkan_av1_stable_API.patch b/meta/recipes-multimedia/ffmpeg/ffmpeg/vulkan_av1_stable_API.patch index 74db148b3b..be6c6b7416 100644 --- a/meta/recipes-multimedia/ffmpeg/ffmpeg/vulkan_av1_stable_API.patch +++ b/meta/recipes-multimedia/ffmpeg/ffmpeg/vulkan_av1_stable_API.patch | |||
@@ -6,6 +6,9 @@ Subject: [PATCH] vulkan_av1: port to the new stable API | |||
6 | Co-Authored-by: Dave Airlie <airlied@redhat.com> | 6 | Co-Authored-by: Dave Airlie <airlied@redhat.com> |
7 | Signed-off-by: Dmitry Baryshkov <dmitry.baryshkov@linaro.org> | 7 | Signed-off-by: Dmitry Baryshkov <dmitry.baryshkov@linaro.org> |
8 | Upstream-Status: Backport [https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/ecdc94b97f809d5f2b88640842fd0541951ad295] | 8 | Upstream-Status: Backport [https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/ecdc94b97f809d5f2b88640842fd0541951ad295] |
9 | |||
10 | Comment: Patch is refreshed as per codebase of 6.1.2 | ||
11 | Signed-off-by: Divyanshu Rathore <divyanshu.rathore@kpit.com> | ||
9 | --- | 12 | --- |
10 | configure | 4 +- | 13 | configure | 4 +- |
11 | libavcodec/Makefile | 5 +- | 14 | libavcodec/Makefile | 5 +- |
@@ -26,7 +29,7 @@ diff --git a/configure b/configure | |||
26 | index e853deb51d..9fa639fca6 100755 | 29 | index e853deb51d..9fa639fca6 100755 |
27 | --- a/configure | 30 | --- a/configure |
28 | +++ b/configure | 31 | +++ b/configure |
29 | @@ -7300,8 +7300,8 @@ enabled vdpau && | 32 | @@ -7160,8 +7160,8 @@ enabled crystalhd && check_lib crystalhd |
30 | "in maintaining it." | 33 | "in maintaining it." |
31 | 34 | ||
32 | if enabled vulkan; then | 35 | if enabled vulkan; then |
@@ -41,21 +44,19 @@ diff --git a/libavcodec/Makefile b/libavcodec/Makefile | |||
41 | index 7ef2e03ca6..9ce6d445c1 100644 | 44 | index 7ef2e03ca6..9ce6d445c1 100644 |
42 | --- a/libavcodec/Makefile | 45 | --- a/libavcodec/Makefile |
43 | +++ b/libavcodec/Makefile | 46 | +++ b/libavcodec/Makefile |
44 | @@ -1258,8 +1258,7 @@ SKIPHEADERS += %_tablegen.h \ | 47 | @@ -1284,7 +1284,6 @@ SKIPHEADERS + |
45 | aacenc_quantization.h \ | 48 | aacenc_quantization.h \ |
46 | aacenc_quantization_misc.h \ | 49 | aacenc_quantization_misc.h \ |
47 | bitstream_template.h \ | 50 | bitstream_template.h \ |
48 | - vulkan_video_codec_av1std.h \ | 51 | - vulkan_video_codec_av1std_mesa.h \ |
49 | - $(ARCH)/vpx_arith.h \ | 52 | $(ARCH)/vpx_arith.h \ |
50 | + $(ARCH)/vpx_arith.h \ | ||
51 | 53 | ||
52 | SKIPHEADERS-$(CONFIG_AMF) += amfenc.h | 54 | SKIPHEADERS-$(CONFIG_AMF) += amfenc.h |
53 | SKIPHEADERS-$(CONFIG_D3D11VA) += d3d11va.h dxva2_internal.h | 55 | @@ -1306,7 +1305,7 @@ SKIPHEADERS-$(CONFIG_XVMC) + |
54 | @@ -1280,7 +1279,7 @@ SKIPHEADERS-$(CONFIG_QSVENC) += qsvenc.h | ||
55 | SKIPHEADERS-$(CONFIG_VAAPI) += vaapi_decode.h vaapi_hevc.h vaapi_encode.h | 56 | SKIPHEADERS-$(CONFIG_VAAPI) += vaapi_decode.h vaapi_hevc.h vaapi_encode.h |
56 | SKIPHEADERS-$(CONFIG_VDPAU) += vdpau.h vdpau_internal.h | 57 | SKIPHEADERS-$(CONFIG_VDPAU) += vdpau.h vdpau_internal.h |
57 | SKIPHEADERS-$(CONFIG_VIDEOTOOLBOX) += videotoolbox.h vt_internal.h | 58 | SKIPHEADERS-$(CONFIG_VIDEOTOOLBOX) += videotoolbox.h vt_internal.h |
58 | -SKIPHEADERS-$(CONFIG_VULKAN) += vulkan.h vulkan_video.h vulkan_decode.h vulkan_video_codec_av1std_decode.h | 59 | -SKIPHEADERS-$(CONFIG_VULKAN) += vulkan.h vulkan_video.h vulkan_decode.h vulkan_video_codec_av1std_decode_mesa.h |
59 | +SKIPHEADERS-$(CONFIG_VULKAN) += vulkan.h vulkan_video.h vulkan_decode.h | 60 | +SKIPHEADERS-$(CONFIG_VULKAN) += vulkan.h vulkan_video.h vulkan_decode.h |
60 | SKIPHEADERS-$(CONFIG_V4L2_M2M) += v4l2_buffers.h v4l2_context.h v4l2_m2m.h | 61 | SKIPHEADERS-$(CONFIG_V4L2_M2M) += v4l2_buffers.h v4l2_context.h v4l2_m2m.h |
61 | SKIPHEADERS-$(CONFIG_ZLIB) += zlib_wrapper.h | 62 | SKIPHEADERS-$(CONFIG_ZLIB) += zlib_wrapper.h |
@@ -866,19 +867,19 @@ diff --git a/libavcodec/vulkan_video.h b/libavcodec/vulkan_video.h | |||
866 | index bb69e920bb..01a1de7d9d 100644 | 867 | index bb69e920bb..01a1de7d9d 100644 |
867 | --- a/libavcodec/vulkan_video.h | 868 | --- a/libavcodec/vulkan_video.h |
868 | +++ b/libavcodec/vulkan_video.h | 869 | +++ b/libavcodec/vulkan_video.h |
869 | @@ -22,8 +22,6 @@ | 870 | @@ -23,8 +23,6 @@ |
870 | #include "vulkan.h" | 871 | #include "vulkan.h" |
871 | 872 | ||
872 | #include <vk_video/vulkan_video_codecs_common.h> | 873 | #include <vk_video/vulkan_video_codecs_common.h> |
873 | -#include "vulkan_video_codec_av1std.h" | 874 | -#include "vulkan_video_codec_av1std_mesa.h" |
874 | -#include "vulkan_video_codec_av1std_decode.h" | 875 | -#include "vulkan_video_codec_av1std_decode_mesa.h" |
875 | 876 | ||
876 | #define CODEC_VER_MAJ(ver) (ver >> 22) | 877 | #define CODEC_VER_MAJ(ver) (ver >> 22) |
877 | #define CODEC_VER_MIN(ver) ((ver >> 12) & ((1 << 10) - 1)) | 878 | #define CODEC_VER_MIN(ver) ((ver >> 12) & ((1 << 10) - 1)) |
878 | diff --git a/libavcodec/vulkan_video_codec_av1std_decode.h b/libavcodec/vulkan_video_codec_av1std_decode.h | 879 | diff --git a/libavcodec/vulkan_video_codec_av1std_decode_mesa.h b/libavcodec/vulkan_video_codec_av1std_decode_mesa.h |
879 | deleted file mode 100644 | 880 | deleted file mode 100644 |
880 | index e2f37b4e6e..0000000000 | 881 | index e2f37b4e6e..0000000000 |
881 | --- a/libavcodec/vulkan_video_codec_av1std_decode.h | 882 | --- a/libavcodec/vulkan_video_codec_av1std_decode_mesa.h |
882 | +++ /dev/null | 883 | +++ /dev/null |
883 | @@ -1,36 +0,0 @@ | 884 | @@ -1,36 +0,0 @@ |
884 | -/* Copyright 2023 Lynne | 885 | -/* Copyright 2023 Lynne |
@@ -897,8 +898,8 @@ index e2f37b4e6e..0000000000 | |||
897 | - * limitations under the License. | 898 | - * limitations under the License. |
898 | - */ | 899 | - */ |
899 | - | 900 | - |
900 | -#ifndef VULKAN_VIDEO_CODEC_AV1STD_DECODE_H_ | 901 | -#ifndef VULKAN_VIDEO_CODEC_AV1STD_DECODE_MESA_H_ |
901 | -#define VULKAN_VIDEO_CODEC_AV1STD_DECODE_H_ 1 | 902 | -#define VULKAN_VIDEO_CODEC_AV1STD_DECODE_MESA_H_ 1 |
902 | - | 903 | - |
903 | -/* | 904 | -/* |
904 | -** This header is NOT YET generated from the Khronos Vulkan XML API Registry. | 905 | -** This header is NOT YET generated from the Khronos Vulkan XML API Registry. |
@@ -917,10 +918,10 @@ index e2f37b4e6e..0000000000 | |||
917 | -#endif | 918 | -#endif |
918 | - | 919 | - |
919 | -#endif | 920 | -#endif |
920 | diff --git a/libavcodec/vulkan_video_codec_av1std.h b/libavcodec/vulkan_video_codec_av1std.h | 921 | diff --git a/libavcodec/vulkan_video_codec_av1std_mesa.h b/libavcodec/vulkan_video_codec_av1std_mesa.h |
921 | deleted file mode 100644 | 922 | deleted file mode 100644 |
922 | index c91589eee2..0000000000 | 923 | index c91589eee2..0000000000 |
923 | --- a/libavcodec/vulkan_video_codec_av1std.h | 924 | --- a/libavcodec/vulkan_video_codec_av1std_mesa.h |
924 | +++ /dev/null | 925 | +++ /dev/null |
925 | @@ -1,403 +0,0 @@ | 926 | @@ -1,403 +0,0 @@ |
926 | -/* Copyright 2023 Lynne | 927 | -/* Copyright 2023 Lynne |
@@ -939,8 +940,8 @@ index c91589eee2..0000000000 | |||
939 | - * limitations under the License. | 940 | - * limitations under the License. |
940 | - */ | 941 | - */ |
941 | - | 942 | - |
942 | -#ifndef VULKAN_VIDEO_CODEC_AV1STD_H_ | 943 | -#ifndef VULKAN_VIDEO_CODEC_AV1STD_MESA_H_ |
943 | -#define VULKAN_VIDEO_CODEC_AV1STD_H_ 1 | 944 | -#define VULKAN_VIDEO_CODEC_AV1STD_MESA_H_ 1 |
944 | - | 945 | - |
945 | -/* | 946 | -/* |
946 | -** This header is NOT YET generated from the Khronos Vulkan XML API Registry. | 947 | -** This header is NOT YET generated from the Khronos Vulkan XML API Registry. |
@@ -1379,4 +1380,3 @@ diff --git a/libavcodec/vulkan_video.c b/libavcodec/vulkan_video.c | |||
1379 | 1380 | ||
1380 | -- | 1381 | -- |
1381 | 2.25.1 | 1382 | 2.25.1 |
1382 | |||
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg_6.1.1.bb b/meta/recipes-multimedia/ffmpeg/ffmpeg_6.1.2.bb index 3d766c3fc7..04356b9932 100644 --- a/meta/recipes-multimedia/ffmpeg/ffmpeg_6.1.1.bb +++ b/meta/recipes-multimedia/ffmpeg/ffmpeg_6.1.2.bb | |||
@@ -31,21 +31,14 @@ SRC_URI = " \ | |||
31 | file://CVE-2024-31578.patch \ | 31 | file://CVE-2024-31578.patch \ |
32 | file://CVE-2024-31582.patch \ | 32 | file://CVE-2024-31582.patch \ |
33 | file://CVE-2023-50008.patch \ | 33 | file://CVE-2023-50008.patch \ |
34 | file://CVE-2024-32230.patch \ | ||
35 | file://CVE-2023-49501.patch \ | 34 | file://CVE-2023-49501.patch \ |
36 | file://CVE-2024-28661.patch \ | 35 | file://CVE-2024-28661.patch \ |
37 | file://CVE-2023-50007.patch \ | 36 | file://CVE-2023-50007.patch \ |
38 | file://CVE-2023-49528.patch \ | 37 | file://CVE-2023-49528.patch \ |
39 | file://CVE-2024-7055.patch \ | ||
40 | file://CVE-2024-35366.patch \ | ||
41 | file://CVE-2024-35367.patch \ | 38 | file://CVE-2024-35367.patch \ |
42 | file://CVE-2024-35368.patch \ | 39 | file://CVE-2024-35368.patch \ |
43 | file://CVE-2024-35365.patch \ | 40 | file://CVE-2024-35365.patch \ |
44 | file://CVE-2024-36613.patch \ | ||
45 | file://CVE-2024-36616.patch \ | ||
46 | file://CVE-2024-36617.patch \ | ||
47 | file://CVE-2024-36618.patch \ | 41 | file://CVE-2024-36618.patch \ |
48 | file://CVE-2024-36619.patch \ | ||
49 | file://CVE-2024-35369.patch \ | 42 | file://CVE-2024-35369.patch \ |
50 | file://CVE-2025-25473.patch \ | 43 | file://CVE-2025-25473.patch \ |
51 | file://CVE-2025-22919.patch \ | 44 | file://CVE-2025-22919.patch \ |
@@ -53,7 +46,7 @@ SRC_URI = " \ | |||
53 | file://CVE-2025-0518.patch \ | 46 | file://CVE-2025-0518.patch \ |
54 | " | 47 | " |
55 | 48 | ||
56 | SRC_URI[sha256sum] = "8684f4b00f94b85461884c3719382f1261f0d9eb3d59640a1f4ac0873616f968" | 49 | SRC_URI[sha256sum] = "3b624649725ecdc565c903ca6643d41f33bd49239922e45c9b1442c63dca4e38" |
57 | 50 | ||
58 | # https://nvd.nist.gov/vuln/detail/CVE-2023-39018 | 51 | # https://nvd.nist.gov/vuln/detail/CVE-2023-39018 |
59 | # https://github.com/bramp/ffmpeg-cli-wrapper/issues/291 | 52 | # https://github.com/bramp/ffmpeg-cli-wrapper/issues/291 |