diff options
2 files changed, 47 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/0024-avisubtitle-Fix-size-checks-and-avoid-overflows-when.patch b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/0024-avisubtitle-Fix-size-checks-and-avoid-overflows-when.patch new file mode 100644 index 0000000000..33af003535 --- /dev/null +++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/0024-avisubtitle-Fix-size-checks-and-avoid-overflows-when.patch | |||
@@ -0,0 +1,46 @@ | |||
1 | From 0870e87c7c02e28e22a09a7de0c5b1e5bed68c14 Mon Sep 17 00:00:00 2001 | ||
2 | From: =?UTF-8?q?Sebastian=20Dr=C3=B6ge?= <sebastian@centricular.com> | ||
3 | Date: Fri, 4 Oct 2024 14:04:03 +0300 | ||
4 | Subject: [PATCH] avisubtitle: Fix size checks and avoid overflows when | ||
5 | checking sizes | ||
6 | |||
7 | Thanks to Antonio Morales for finding and reporting the issue. | ||
8 | |||
9 | Fixes GHSL-2024-262 | ||
10 | Fixes https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/3890 | ||
11 | |||
12 | Part-of: <https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8043> | ||
13 | |||
14 | CVE: CVE-2024-47774 | ||
15 | Upstream-Status: Backport [https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/0870e87c7c02e28e22a09a7de0c5b1e5bed68c14] | ||
16 | Signed-off-by: Peter Marko <peter.marko@siemens.com> | ||
17 | --- | ||
18 | gst/avi/gstavisubtitle.c | 5 +++-- | ||
19 | 1 file changed, 3 insertions(+), 2 deletions(-) | ||
20 | |||
21 | diff --git a/gst/avi/gstavisubtitle.c b/gst/avi/gstavisubtitle.c | ||
22 | index efc5f04051..c816934da6 100644 | ||
23 | --- a/gst/avi/gstavisubtitle.c | ||
24 | +++ b/gst/avi/gstavisubtitle.c | ||
25 | @@ -196,7 +196,7 @@ gst_avi_subtitle_parse_gab2_chunk (GstAviSubtitle * sub, GstBuffer * buf) | ||
26 | /* read 'name' of subtitle */ | ||
27 | name_length = GST_READ_UINT32_LE (map.data + 5 + 2); | ||
28 | GST_LOG_OBJECT (sub, "length of name: %u", name_length); | ||
29 | - if (map.size <= 17 + name_length) | ||
30 | + if (G_MAXUINT32 - 17 < name_length || map.size < 17 + name_length) | ||
31 | goto wrong_name_length; | ||
32 | |||
33 | name_utf8 = | ||
34 | @@ -216,7 +216,8 @@ gst_avi_subtitle_parse_gab2_chunk (GstAviSubtitle * sub, GstBuffer * buf) | ||
35 | file_length = GST_READ_UINT32_LE (map.data + 13 + name_length); | ||
36 | GST_LOG_OBJECT (sub, "length srt/ssa file: %u", file_length); | ||
37 | |||
38 | - if (map.size < (17 + name_length + file_length)) | ||
39 | + if (G_MAXUINT32 - 17 - name_length < file_length | ||
40 | + || map.size < 17 + name_length + file_length) | ||
41 | goto wrong_total_length; | ||
42 | |||
43 | /* store this, so we can send it again after a seek; note that we shouldn't | ||
44 | -- | ||
45 | 2.30.2 | ||
46 | |||
diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_1.22.12.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_1.22.12.bb index 7f8cd7c96c..247fda7f9c 100644 --- a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_1.22.12.bb +++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_1.22.12.bb | |||
@@ -30,6 +30,7 @@ SRC_URI = "https://gstreamer.freedesktop.org/src/gst-plugins-good/gst-plugins-go | |||
30 | file://0021-matroskademux-Put-a-copy-of-the-codec-data-into-the-.patch \ | 30 | file://0021-matroskademux-Put-a-copy-of-the-codec-data-into-the-.patch \ |
31 | file://0022-jpegdec-Directly-error-out-on-negotiation-failures.patch \ | 31 | file://0022-jpegdec-Directly-error-out-on-negotiation-failures.patch \ |
32 | file://0023-qtdemux-Avoid-integer-overflow-when-parsing-Theora-e.patch \ | 32 | file://0023-qtdemux-Avoid-integer-overflow-when-parsing-Theora-e.patch \ |
33 | file://0024-avisubtitle-Fix-size-checks-and-avoid-overflows-when.patch \ | ||
33 | " | 34 | " |
34 | 35 | ||
35 | SRC_URI[sha256sum] = "9c1913f981900bd8867182639b20907b28ed78ef7a222cfbf2d8ba9dab992fa7" | 36 | SRC_URI[sha256sum] = "9c1913f981900bd8867182639b20907b28ed78ef7a222cfbf2d8ba9dab992fa7" |