diff options
Diffstat (limited to 'meta')
| -rw-r--r-- | meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36613.patch | 37 | ||||
| -rw-r--r-- | meta/recipes-multimedia/ffmpeg/ffmpeg_6.1.1.bb | 1 |
2 files changed, 38 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36613.patch b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36613.patch new file mode 100644 index 0000000000..0061b7ad98 --- /dev/null +++ b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36613.patch | |||
| @@ -0,0 +1,37 @@ | |||
| 1 | From 50d8e4f27398fd5778485a827d7a2817921f8540 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Michael Niedermayer <michael@niedermayer.cc> | ||
| 3 | Date: Sat, 30 Sep 2023 00:51:29 +0200 | ||
| 4 | Subject: [PATCH] avformat/dxa: Adjust order of operations around block align | ||
| 5 | |||
| 6 | Fixes: 51896/clusterfuzz-testcase-minimized-ffmpeg_dem_DXA_fuzzer-5730576523198464 | ||
| 7 | Fixes: signed integer overflow: 2147483566 + 82 cannot be represented in type 'int' | ||
| 8 | |||
| 9 | Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg | ||
| 10 | Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ||
| 11 | (cherry picked from commit 50d8e4f27398fd5778485a827d7a2817921f8540) | ||
| 12 | Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ||
| 13 | |||
| 14 | CVE: CVE-2024-36613 | ||
| 15 | |||
| 16 | Upstream-Status: Backport [https://github.com/ffmpeg/ffmpeg/commit/50d8e4f27398fd5778485a827d7a2817921f8540] | ||
| 17 | |||
| 18 | Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> | ||
| 19 | --- | ||
| 20 | libavformat/dxa.c | 2 +- | ||
| 21 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
| 22 | |||
| 23 | diff --git a/libavformat/dxa.c b/libavformat/dxa.c | ||
| 24 | index 474b852..b4d9d00 100644 | ||
| 25 | --- a/libavformat/dxa.c | ||
| 26 | +++ b/libavformat/dxa.c | ||
| 27 | @@ -122,7 +122,7 @@ static int dxa_read_header(AVFormatContext *s) | ||
| 28 | if(ast->codecpar->block_align) { | ||
| 29 | if (c->bpc > INT_MAX - ast->codecpar->block_align + 1) | ||
| 30 | return AVERROR_INVALIDDATA; | ||
| 31 | - c->bpc = ((c->bpc + ast->codecpar->block_align - 1) / ast->codecpar->block_align) * ast->codecpar->block_align; | ||
| 32 | + c->bpc = ((c->bpc - 1 + ast->codecpar->block_align) / ast->codecpar->block_align) * ast->codecpar->block_align; | ||
| 33 | } | ||
| 34 | c->bytes_left = fsize; | ||
| 35 | c->wavpos = avio_tell(pb); | ||
| 36 | -- | ||
| 37 | 2.40.0 | ||
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg_6.1.1.bb b/meta/recipes-multimedia/ffmpeg/ffmpeg_6.1.1.bb index fb3f954904..5e22fd4080 100644 --- a/meta/recipes-multimedia/ffmpeg/ffmpeg_6.1.1.bb +++ b/meta/recipes-multimedia/ffmpeg/ffmpeg_6.1.1.bb | |||
| @@ -41,6 +41,7 @@ SRC_URI = " \ | |||
| 41 | file://CVE-2024-35367.patch \ | 41 | file://CVE-2024-35367.patch \ |
| 42 | file://CVE-2024-35368.patch \ | 42 | file://CVE-2024-35368.patch \ |
| 43 | file://CVE-2024-35365.patch \ | 43 | file://CVE-2024-35365.patch \ |
| 44 | file://CVE-2024-36613.patch \ | ||
| 44 | " | 45 | " |
| 45 | 46 | ||
| 46 | SRC_URI[sha256sum] = "8684f4b00f94b85461884c3719382f1261f0d9eb3d59640a1f4ac0873616f968" | 47 | SRC_URI[sha256sum] = "8684f4b00f94b85461884c3719382f1261f0d9eb3d59640a1f4ac0873616f968" |
