new file mode 100644
@@ -0,0 +1,31 @@
+From 4f8a793807d57d6a28aac3ab73ba0992efd5d828 Mon Sep 17 00:00:00 2001
+From: Andrew Wesie <awesie@gmail.com>
+Date: Mon, 5 Oct 2020 00:33:44 -0500
+Subject: [PATCH] Check return value of ltp_data.
+
+Fixes #62.
+
+CVE: CVE-2021-32278
+Upstream-Status: Backport [https://github.com/knik0/faad2/commit/e19a5e491354e0e4664d02b796dacee28fb2521e]
+
+Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
+---
+ libfaad/syntax.c | 5 ++++-
+ 1 file changed, 4 insertions(+), 1 deletion(-)
+
+diff --git a/libfaad/syntax.c b/libfaad/syntax.c
+index 462ba9e..4e57efd 100644
+--- a/libfaad/syntax.c
++++ b/libfaad/syntax.c
+@@ -872,7 +872,10 @@ static uint8_t ics_info(NeAACDecStruct *hDecoder, ic_stream *ics, bitfile *ld,
+ if ((ics->ltp.data_present = faad_get1bit(ld
+ DEBUGVAR(1,50,"ics_info(): ltp.data_present"))) & 1)
+ {
+- ltp_data(hDecoder, ics, &(ics->ltp), ld);
++ if ((retval = ltp_data(hDecoder, ics, &(ics->ltp), ld)) > 0)
++ {
++ return retval;
++ }
+ }
+ }
+ #endif
@@ -11,6 +11,7 @@ SRC_URI = "${SOURCEFORGE_MIRROR}/faac/faad2-src/faad2-2.8.0/${BP}.tar.gz \
file://0001-fix-heap-buffer-overflow-in-mp4read.c.patch \
file://0001-mp4read.c-fix-stack-buffer-overflow-in-stringin-ftyp.patch \
file://0001-Restrict-SBR-frame-length-to-960-and-1024-samples.patch \
+ file://0001-Check-return-value-of-ltp_data.patch \
"
SRC_URI[md5sum] = "28f6116efdbe9378269f8a6221767d1f"
SRC_URI[sha256sum] = "985c3fadb9789d2815e50f4ff714511c79c2710ac27a4aaaf5c0c2662141426d"
Details: https://nvd.nist.gov/vuln/detail/CVE-2021-32278 Pick the patch that is marked to revolve the issue linked in the nvd report. Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> --- .../0001-Check-return-value-of-ltp_data.patch | 31 +++++++++++++++++++ .../recipes-multimedia/faad2/faad2_2.8.8.bb | 1 + 2 files changed, 32 insertions(+) create mode 100644 meta-oe/recipes-multimedia/faad2/faad2/0001-Check-return-value-of-ltp_data.patch