summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/python/python3/CVE-2022-42919.patch
diff options
context:
space:
mode:
authorNarpat Mali <narpat.mali@windriver.com>2022-11-23 14:27:04 +0000
committerRichard Purdie <richard.purdie@linuxfoundation.org>2022-12-01 19:35:04 +0000
commitfbb6e1401395cbe3a5f67392a43157ed104f8b42 (patch)
tree4c278fef4424531c35c4e141034e8f92a1b11ed2 /meta/recipes-devtools/python/python3/CVE-2022-42919.patch
parent97a593210126ffc2c5ffe3961e17c9810a66742a (diff)
downloadpoky-fbb6e1401395cbe3a5f67392a43157ed104f8b42.tar.gz
ffmpeg: fix for CVE-2022-3964
A vulnerability classified as problematic has been found in ffmpeg. This affects an unknown part of the file libavcodec/rpzaenc.c of the component QuickTime RPZA Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. It is possible to initiate the attack remotely. The name of the patch is 92f9b28ed84a77138105475beba16c146bdaf984. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213543. Reference: https://nvd.nist.gov/vuln/detail/CVE-2022-3964 Upstream Fix: https://github.com/FFmpeg/FFmpeg/commit/92f9b28ed84a77138105475beba16c146bdaf984 (From OE-Core rev: 40a1c9d3c839df6479582ac27264fac851a0d4c3) Signed-off-by: Narpat Mali <narpat.mali@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/python/python3/CVE-2022-42919.patch')
0 files changed, 0 insertions, 0 deletions