From 193236933b0f4ab91b1625b64e2187e2db4e0e8f Mon Sep 17 00:00:00 2001 From: Brad Bishop Date: Fri, 5 Apr 2019 15:28:33 -0400 Subject: reset upstream subtrees to HEAD Reset the following subtrees on HEAD: poky: 8217b477a1(master) meta-xilinx: 64aa3d35ae(master) meta-openembedded: 0435c9e193(master) meta-raspberrypi: 490a4441ac(master) meta-security: cb6d1c85ee(master) Squashed patches: meta-phosphor: drop systemd 239 patches meta-phosphor: mrw-api: use correct install path Change-Id: I268e2646d9174ad305630c6bbd3fbc1a6105f43d Signed-off-by: Brad Bishop --- .../gst-plugins-bad/buffer-overflow-mp4.patch | 36 ---------------------- 1 file changed, 36 deletions(-) delete mode 100644 meta-openembedded/meta-multimedia/recipes-multimedia/gstreamer-0.10/gst-plugins-bad/buffer-overflow-mp4.patch (limited to 'meta-openembedded/meta-multimedia/recipes-multimedia/gstreamer-0.10/gst-plugins-bad/buffer-overflow-mp4.patch') diff --git a/meta-openembedded/meta-multimedia/recipes-multimedia/gstreamer-0.10/gst-plugins-bad/buffer-overflow-mp4.patch b/meta-openembedded/meta-multimedia/recipes-multimedia/gstreamer-0.10/gst-plugins-bad/buffer-overflow-mp4.patch deleted file mode 100644 index 235acda8b..000000000 --- a/meta-openembedded/meta-multimedia/recipes-multimedia/gstreamer-0.10/gst-plugins-bad/buffer-overflow-mp4.patch +++ /dev/null @@ -1,36 +0,0 @@ -Description: Fix buffer overflow in mp4 parsing -Author: Ralph Giles ---- -Backport patch from debian to fix CVE-2015-0797. -https://sources.debian.net/data/main/g/gst-plugins-bad0.10/0.10.23-7.1+deb7u2/debian/patches/buffer-overflow-mp4.patch - -Upstream-Status: Backport - -Signed-off-by: Kai Kang ---- ---- gst-plugins-bad0.10-0.10.23.orig/gst/videoparsers/gsth264parse.c -+++ gst-plugins-bad0.10-0.10.23/gst/videoparsers/gsth264parse.c -@@ -384,6 +384,11 @@ gst_h264_parse_wrap_nal (GstH264Parse * - - GST_DEBUG_OBJECT (h264parse, "nal length %d", size); - -+ if (size > G_MAXUINT32 - nl) { -+ GST_ELEMENT_ERROR (h264parse, STREAM, FAILED, (NULL), -+ ("overflow in nal size")); -+ return NULL; -+ } - buf = gst_buffer_new_and_alloc (size + nl + 4); - if (format == GST_H264_PARSE_FORMAT_AVC) { - GST_WRITE_UINT32_BE (GST_BUFFER_DATA (buf), size << (32 - 8 * nl)); -@@ -452,6 +457,11 @@ gst_h264_parse_process_nal (GstH264Parse - GST_DEBUG_OBJECT (h264parse, "not processing nal size %u", nalu->size); - return; - } -+ if (G_UNLIKELY (nalu->size > 20 * 1024 * 1024)) { -+ GST_DEBUG_OBJECT (h264parse, "not processing nal size %u (too big)", -+ nalu->size); -+ return; -+ } - - /* we have a peek as well */ - nal_type = nalu->type; -- cgit v1.2.1