On Fri, Sep 22, 2023 at 12:25 AM Michael Opdenacker via
lists.openembedded.org
<michael.opdenacker=bootlin....@lists.openembedded.org> wrote:
>
> From: Michael Opdenacker <michael.opdenac...@bootlin.com>
>
> Buffer Overflow vulnerability in function bitwriter_grow_ in flac before
> 1.4.0 allows remote attackers to run arbitrary code via crafted input to
> the encoder.
>
> Signed-off-by: Meenali Gupta <meenali.gu...@windriver.com>
> Signed-off-by: Michael Opdenacker <michael.opdenac...@bootlin.com>
> Tested-by: Michael Opdenacker <michael.opdenac...@bootlin.com>
>
> ---
>  meta/recipes-multimedia/flac/flac_1.3.3.bb | 1 +
>  1 file changed, 1 insertion(+)
>
> diff --git a/meta/recipes-multimedia/flac/flac_1.3.3.bb 
> b/meta/recipes-multimedia/flac/flac_1.3.3.bb
> index cb6692aedf..ca04f36d1a 100644
> --- a/meta/recipes-multimedia/flac/flac_1.3.3.bb
> +++ b/meta/recipes-multimedia/flac/flac_1.3.3.bb
> @@ -15,6 +15,7 @@ LIC_FILES_CHKSUM = 
> "file://COPYING.FDL;md5=ad1419ecc56e060eccf8184a87c4285f \
>  DEPENDS = "libogg"
>
>  SRC_URI = "http://downloads.xiph.org/releases/flac/${BP}.tar.xz \
> +           file://CVE-2020-22219.patch \

You'll need to add the patch file to the commit too :-)

Steve
>  "
>
>  SRC_URI[md5sum] = "26703ed2858c1fc9ffc05136d13daa69"
> --
> 2.34.1
>
>
> 
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#188125): 
https://lists.openembedded.org/g/openembedded-core/message/188125
Mute This Topic: https://lists.openembedded.org/mt/101518444/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to