diff options
author | Yue Tao <Yue.Tao@windriver.com> | 2014-04-27 19:51:12 +0800 |
---|---|---|
committer | Saul Wold <sgw@linux.intel.com> | 2014-05-21 08:23:10 -0700 |
commit | 8c9868d074f5d09022efc9419ee09eb805f68394 (patch) | |
tree | 3bb00751bbf78f60d96aa63479cdc770f6a0af65 /meta/recipes-multimedia/gstreamer/gst-ffmpeg_0.10.13.bb | |
parent | 0ee8754c973f5eff3ba4d00319a5308888c12b17 (diff) | |
download | openembedded-core-contrib-8c9868d074f5d09022efc9419ee09eb805f68394.tar.gz |
gst-ffmpeg: fix for Security Advisory CVE-2013-0851
The decode_frame function in libavcodec/eamad.c in FFmpeg before 1.1
allows remote attackers to have an unspecified impact via crafted
Electronic Arts Madcow video data, which triggers an out-of-bounds array
access.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0851
Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Roy Li <rongqing.li@windriver.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Diffstat (limited to 'meta/recipes-multimedia/gstreamer/gst-ffmpeg_0.10.13.bb')
-rw-r--r-- | meta/recipes-multimedia/gstreamer/gst-ffmpeg_0.10.13.bb | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/gstreamer/gst-ffmpeg_0.10.13.bb b/meta/recipes-multimedia/gstreamer/gst-ffmpeg_0.10.13.bb index a603ff5d48..0d0ba9a3ae 100644 --- a/meta/recipes-multimedia/gstreamer/gst-ffmpeg_0.10.13.bb +++ b/meta/recipes-multimedia/gstreamer/gst-ffmpeg_0.10.13.bb @@ -31,6 +31,7 @@ SRC_URI = "http://gstreamer.freedesktop.org/src/${BPN}/${BPN}-${PV}.tar.bz2 \ file://0001-alsdec-check-block-length.patch \ file://0001-pgssubdec-check-RLE-size-before-copying.-Fix-out-of-.patch \ file://0001-atrac3dec-Check-coding-mode-against-channels.patch \ + file://0001-eamad-fix-out-of-array-accesses.patch \ " SRC_URI[md5sum] = "7f5beacaf1312db2db30a026b36888c4" |