CVE-2022-3725
This commit is contained in:
parent
6f3f9fe8a3
commit
0995a5da64
32
CVE-2022-3725.patch
Normal file
32
CVE-2022-3725.patch
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
From 5db46d3a7c0f6481361a4a007de125ab92bfb674 Mon Sep 17 00:00:00 2001
|
||||||
|
From: John Thacker <johnthacker@gmail.com>
|
||||||
|
Date: Mon, 26 Sep 2022 19:55:59 -0400
|
||||||
|
Subject: [PATCH] opus: Don't overflow a signed 16-bit integer
|
||||||
|
|
||||||
|
The internal sample rate of 48KHz overflows a signed 16-bit
|
||||||
|
integer, and causes incorrect calculations. Use an unsigned integer.
|
||||||
|
|
||||||
|
Fix #18378
|
||||||
|
|
||||||
|
|
||||||
|
(cherry picked from commit 749a8d091200b43175268689996471b59fa34266)
|
||||||
|
---
|
||||||
|
epan/dissectors/packet-opus.c | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/epan/dissectors/packet-opus.c b/epan/dissectors/packet-opus.c
|
||||||
|
index 9451fed0a1..54a83a007e 100644
|
||||||
|
--- a/epan/dissectors/packet-opus.c
|
||||||
|
+++ b/epan/dissectors/packet-opus.c
|
||||||
|
@@ -128,7 +128,7 @@ parse_size_field(const unsigned char *ch, int32_t cn, int16_t *size)
|
||||||
|
}
|
||||||
|
|
||||||
|
static int16_t
|
||||||
|
-opus_packet_get_samples_per_frame(const unsigned char *data, int16_t Fs)
|
||||||
|
+opus_packet_get_samples_per_frame(const unsigned char *data, uint16_t Fs)
|
||||||
|
{
|
||||||
|
int audiosize;
|
||||||
|
if (data[0] & 0x80) {
|
||||||
|
--
|
||||||
|
GitLab
|
||||||
|
|
||||||
@ -5,7 +5,7 @@
|
|||||||
Summary: Network traffic analyzer
|
Summary: Network traffic analyzer
|
||||||
Name: wireshark
|
Name: wireshark
|
||||||
Version: 3.6.3
|
Version: 3.6.3
|
||||||
Release: 2
|
Release: 3
|
||||||
Epoch: 1
|
Epoch: 1
|
||||||
License: GPL+
|
License: GPL+
|
||||||
Url: http://www.wireshark.org/
|
Url: http://www.wireshark.org/
|
||||||
@ -22,6 +22,7 @@ Patch5: wireshark-0005-Fix-paths-in-a-wireshark.desktop-file.patch
|
|||||||
Patch6: wireshark-0006-Move-tmp-to-var-tmp.patch
|
Patch6: wireshark-0006-Move-tmp-to-var-tmp.patch
|
||||||
Patch7: wireshark-0007-cmakelists.patch
|
Patch7: wireshark-0007-cmakelists.patch
|
||||||
Patch8: CVE-2022-3190.patch
|
Patch8: CVE-2022-3190.patch
|
||||||
|
Patch9: CVE-2022-3725.patch
|
||||||
|
|
||||||
Requires: xdg-utils
|
Requires: xdg-utils
|
||||||
Requires: hicolor-icon-theme
|
Requires: hicolor-icon-theme
|
||||||
@ -196,6 +197,9 @@ exit 0
|
|||||||
%{_mandir}/man?/*
|
%{_mandir}/man?/*
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Wed Nov 09 2022 liyuxiang<liyuxiang@ncti-gba.cn> - 1:3.6.3-3
|
||||||
|
- fix CVE-2022-3725
|
||||||
|
|
||||||
* Tue Sep 27 2022 liyuxiang<liyuxiang@ncti-gba.cn> - 1:3.6.3-2
|
* Tue Sep 27 2022 liyuxiang<liyuxiang@ncti-gba.cn> - 1:3.6.3-2
|
||||||
- fix CVE-2022-3190
|
- fix CVE-2022-3190
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user