diff options
author | Brad Bishop <bradleyb@fuzziesquirrel.com> | 2019-04-05 15:28:33 -0400 |
---|---|---|
committer | Brad Bishop <bradleyb@fuzziesquirrel.com> | 2019-04-05 19:31:28 +0000 |
commit | 193236933b0f4ab91b1625b64e2187e2db4e0e8f (patch) | |
tree | e12769d7c76d8b0517d6de3d3c72189753d253ed /meta-openembedded/meta-multimedia/recipes-multimedia/gstreamer-0.10/gst-plugins-bad/buffer-overflow-mp4.patch | |
parent | bd93df9478f2f56ffcbc8cb88f1709c735dcd85b (diff) | |
download | blackbird-openbmc-193236933b0f4ab91b1625b64e2187e2db4e0e8f.tar.gz blackbird-openbmc-193236933b0f4ab91b1625b64e2187e2db4e0e8f.zip |
reset upstream subtrees to HEAD
Reset the following subtrees on HEAD:
poky: 8217b477a1(master)
meta-xilinx: 64aa3d35ae(master)
meta-openembedded: 0435c9e193(master)
meta-raspberrypi: 490a4441ac(master)
meta-security: cb6d1c85ee(master)
Squashed patches:
meta-phosphor: drop systemd 239 patches
meta-phosphor: mrw-api: use correct install path
Change-Id: I268e2646d9174ad305630c6bbd3fbc1a6105f43d
Signed-off-by: Brad Bishop <bradleyb@fuzziesquirrel.com>
Diffstat (limited to 'meta-openembedded/meta-multimedia/recipes-multimedia/gstreamer-0.10/gst-plugins-bad/buffer-overflow-mp4.patch')
-rw-r--r-- | meta-openembedded/meta-multimedia/recipes-multimedia/gstreamer-0.10/gst-plugins-bad/buffer-overflow-mp4.patch | 36 |
1 files changed, 0 insertions, 36 deletions
diff --git a/meta-openembedded/meta-multimedia/recipes-multimedia/gstreamer-0.10/gst-plugins-bad/buffer-overflow-mp4.patch b/meta-openembedded/meta-multimedia/recipes-multimedia/gstreamer-0.10/gst-plugins-bad/buffer-overflow-mp4.patch deleted file mode 100644 index 235acda8b..000000000 --- a/meta-openembedded/meta-multimedia/recipes-multimedia/gstreamer-0.10/gst-plugins-bad/buffer-overflow-mp4.patch +++ /dev/null @@ -1,36 +0,0 @@ -Description: Fix buffer overflow in mp4 parsing -Author: Ralph Giles <giles@mozilla.com> ---- -Backport patch from debian to fix CVE-2015-0797. -https://sources.debian.net/data/main/g/gst-plugins-bad0.10/0.10.23-7.1+deb7u2/debian/patches/buffer-overflow-mp4.patch - -Upstream-Status: Backport - -Signed-off-by: Kai Kang <kai.kang@windriver.com> ---- ---- gst-plugins-bad0.10-0.10.23.orig/gst/videoparsers/gsth264parse.c -+++ gst-plugins-bad0.10-0.10.23/gst/videoparsers/gsth264parse.c -@@ -384,6 +384,11 @@ gst_h264_parse_wrap_nal (GstH264Parse * - - GST_DEBUG_OBJECT (h264parse, "nal length %d", size); - -+ if (size > G_MAXUINT32 - nl) { -+ GST_ELEMENT_ERROR (h264parse, STREAM, FAILED, (NULL), -+ ("overflow in nal size")); -+ return NULL; -+ } - buf = gst_buffer_new_and_alloc (size + nl + 4); - if (format == GST_H264_PARSE_FORMAT_AVC) { - GST_WRITE_UINT32_BE (GST_BUFFER_DATA (buf), size << (32 - 8 * nl)); -@@ -452,6 +457,11 @@ gst_h264_parse_process_nal (GstH264Parse - GST_DEBUG_OBJECT (h264parse, "not processing nal size %u", nalu->size); - return; - } -+ if (G_UNLIKELY (nalu->size > 20 * 1024 * 1024)) { -+ GST_DEBUG_OBJECT (h264parse, "not processing nal size %u (too big)", -+ nalu->size); -+ return; -+ } - - /* we have a peek as well */ - nal_type = nalu->type; |