diff options
| author | Archana Polampalli <archana.polampalli@windriver.com> | 2025-01-03 07:11:36 +0000 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2025-01-09 08:41:04 -0800 |
| commit | c17700b7845a899d40bcd7012c46d984f12e6fab (patch) | |
| tree | 27b470b99ba46ced3e48598c906bc376c7a1a63e /meta | |
| parent | de796b196657ad42056b84e7723253619a6176b6 (diff) | |
| download | poky-c17700b7845a899d40bcd7012c46d984f12e6fab.tar.gz | |
ffmpeg: fix CVE-2024-35366
FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the parse_options
function of sbgdec.c within the libavformat module. When parsing certain options,
the software does not adequately validate the input. This allows for negative
duration values to be accepted without proper bounds checking.
(From OE-Core rev: 9acfc54b2707bf04922f153d06ae27ff552fbe23)
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta')
| -rw-r--r-- | meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-35366.patch | 37 | ||||
| -rw-r--r-- | meta/recipes-multimedia/ffmpeg/ffmpeg_5.0.1.bb | 1 |
2 files changed, 38 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-35366.patch b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-35366.patch new file mode 100644 index 0000000000..f619dd6eac --- /dev/null +++ b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-35366.patch | |||
| @@ -0,0 +1,37 @@ | |||
| 1 | From 4db0eb4653efad967ddcf71f564fd2f1169bafcb Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Michael Niedermayer <michael@niedermayer.cc> | ||
| 3 | Date: Tue, 26 Mar 2024 00:39:49 +0100 | ||
| 4 | Subject: [PATCH] avformat/sbgdec: Check for negative duration | ||
| 5 | |||
| 6 | Fixes: signed integer overflow: 9223372036854775807 - -8000000 cannot be represented in type 'long' | ||
| 7 | Fixes: 62276/clusterfuzz-testcase-minimized-ffmpeg_dem_SBG_fuzzer-5133181743136768 | ||
| 8 | |||
| 9 | Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg | ||
| 10 | Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ||
| 11 | (cherry picked from commit 0bed22d597b78999151e3bde0768b7fe763fc2a6) | ||
| 12 | Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ||
| 13 | |||
| 14 | CVE: CVE-2024-35366 | ||
| 15 | |||
| 16 | Upstream-Status: Backport [https://github.com/ffmpeg/ffmpeg/commit/4db0eb4653efad967ddcf71f564fd2f1169bafcb] | ||
| 17 | |||
| 18 | Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> | ||
| 19 | --- | ||
| 20 | libavformat/sbgdec.c | 2 +- | ||
| 21 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
| 22 | |||
| 23 | diff --git a/libavformat/sbgdec.c b/libavformat/sbgdec.c | ||
| 24 | index 1ef50e1598..fdcee0b452 100644 | ||
| 25 | --- a/libavformat/sbgdec.c | ||
| 26 | +++ b/libavformat/sbgdec.c | ||
| 27 | @@ -385,7 +385,7 @@ static int parse_options(struct sbg_parser *p) | ||
| 28 | case 'L': | ||
| 29 | FORWARD_ERROR(parse_optarg(p, opt, &oarg)); | ||
| 30 | r = str_to_time(oarg.s, &p->scs.opt_duration); | ||
| 31 | - if (oarg.e != oarg.s + r) { | ||
| 32 | + if (oarg.e != oarg.s + r || p->scs.opt_duration < 0) { | ||
| 33 | snprintf(p->err_msg, sizeof(p->err_msg), | ||
| 34 | "syntax error for option -L"); | ||
| 35 | return AVERROR_INVALIDDATA; | ||
| 36 | -- | ||
| 37 | 2.40.0 | ||
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg_5.0.1.bb b/meta/recipes-multimedia/ffmpeg/ffmpeg_5.0.1.bb index 7b03b7cbc0..39d79c343d 100644 --- a/meta/recipes-multimedia/ffmpeg/ffmpeg_5.0.1.bb +++ b/meta/recipes-multimedia/ffmpeg/ffmpeg_5.0.1.bb | |||
| @@ -40,6 +40,7 @@ SRC_URI = "https://www.ffmpeg.org/releases/${BP}.tar.xz \ | |||
| 40 | file://CVE-2023-50007.patch \ | 40 | file://CVE-2023-50007.patch \ |
| 41 | file://CVE-2023-51796.patch \ | 41 | file://CVE-2023-51796.patch \ |
| 42 | file://CVE-2024-7055.patch \ | 42 | file://CVE-2024-7055.patch \ |
| 43 | file://CVE-2024-35366.patch \ | ||
| 43 | " | 44 | " |
| 44 | 45 | ||
| 45 | SRC_URI[sha256sum] = "ef2efae259ce80a240de48ec85ecb062cecca26e4352ffb3fda562c21a93007b" | 46 | SRC_URI[sha256sum] = "ef2efae259ce80a240de48ec85ecb062cecca26e4352ffb3fda562c21a93007b" |
