Home - Waterfall Grid T-Grid Console Builders Recent Builds Buildslaves Changesources - JSON API - About

Builder ffmpeg-solaris10-i386 Build #13712

Results:

Failed shell_2 shell_3 shell_4 shell_5

SourceStamp:

Projectffmpeg
Repositoryhttps://git.ffmpeg.org/ffmpeg.git
Branchmaster
Revision52b78cd3fe411662b1db06e63c17b5d1399155ee
Got Revision52b78cd3fe411662b1db06e63c17b5d1399155ee
Changes5 changes

BuildSlave:

unstable10x

Reason:

The SingleBranchScheduler scheduler named 'schedule-ffmpeg-solaris10-i386' triggered this build

Steps and Logfiles:

  1. git update ( 5 secs )
    1. stdio
  2. shell 'gsed -i ...' ( 0 secs )
    1. stdio
  3. shell_1 'gsed -i ...' ( 0 secs )
    1. stdio
  4. shell_2 'gsed -i ...' failed ( 0 secs )
    1. stdio
  5. shell_3 './configure --samples="../../../ffmpeg/fate-suite" ...' failed ( 9 secs )
    1. stdio
    2. config.log
  6. shell_4 'gmake fate-rsync' failed ( 0 secs )
    1. stdio
  7. shell_5 '../../../ffmpeg/fate.sh ../../../ffmpeg/fate_config.sh' failed ( 2 secs )
    1. stdio
    2. configure.log
    3. compile.log
    4. test.log

Build Properties:

NameValueSource
branch master Build
builddir /export/home/buildbot/slave/ffmpeg-solaris10-i386 slave
buildername ffmpeg-solaris10-i386 Builder
buildnumber 13712 Build
codebase Build
got_revision 52b78cd3fe411662b1db06e63c17b5d1399155ee Git
project ffmpeg Build
repository https://git.ffmpeg.org/ffmpeg.git Build
revision 52b78cd3fe411662b1db06e63c17b5d1399155ee Build
scheduler schedule-ffmpeg-solaris10-i386 Scheduler
slavename unstable10x BuildSlave
workdir /export/home/buildbot/slave/ffmpeg-solaris10-i386 slave (deprecated)

Forced Build Properties:

NameLabelValue

Responsible Users:

  1. Michael Niedermayer
  2. depthfirst-dev[bot]

Timing:

StartSun May 3 14:52:47 2026
EndSun May 3 14:53:07 2026
Elapsed19 secs

All Changes:

:

  1. Change #266156

    Category ffmpeg
    Changed by Michael Niedermayer <michaelohnoyoudont@niedermayer.cc>
    Changed at Sun 03 May 2026 14:42:47
    Repository https://git.ffmpeg.org/ffmpeg.git
    Project ffmpeg
    Branch master
    Revision 1886c3269d8a5cc15391ace1db598230d4fba5a4

    Comments

    avcodec/h264_refs: Clear stale pointers from ref_list
    Testcase: poc10.bin
    
    Reported-by: Dale Curtis <dalecurtis@chromium.org>
    Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>

    Changed files

    • libavcodec/h264_refs.c
  2. Change #266157

    Category ffmpeg
    Changed by Michael Niedermayer <michaelohnoyoudont@niedermayer.cc>
    Changed at Sun 03 May 2026 14:42:47
    Repository https://git.ffmpeg.org/ffmpeg.git
    Project ffmpeg
    Branch master
    Revision 17723863922bd80e29cc957507cef7ae79eddccb

    Comments

    avcodec/h264: recompute per-slice direct mode state for every slice
    Regression since: 7f05c5cea04112471d8147487aa3b44141922d09
    Fixes: poc10
    Fixes: null pointer dereference
    
    Reported-by: Dale Curtis <dalecurtis@chromium.org>
    Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>

    Changed files

    • libavcodec/h264_direct.c
    • libavcodec/h264_slice.c
  3. Change #266158

    Category ffmpeg
    Changed by depthfirst-dev[bot] <1012587+depthfirst-dev[bot]ohnoyoudont@users.noreply.github.com>
    Changed at Sun 03 May 2026 14:42:57
    Repository https://git.ffmpeg.org/ffmpeg.git
    Project ffmpeg
    Branch master
    Revision 664d44a8254813a6d78432e57e02223a1e185467

    Comments

    avformat/rtpdec_latm: avoid integer overflow in LATM length parsing
    latm_parse_packet() accumulated attacker-controlled AU length bytes in
    a signed int and later checked data->pos + cur_len against data->len.
    That addition could overflow, allowing malformed packets to bypass the
    bounds check and drive memcpy() far past the end of the LATM buffer.
    
    Reject length-byte accumulation that would exceed the remaining packet
    size, and compare cur_len against the remaining buffer space using
    subtraction so the bounds check cannot overflow.
    
    Fixes: DFVULN-610
    
    *Vulnerability reported by Zhenpeng (Leo) Lin at depthfirst*
    *Patch validated by Zheng Yu at depthfirst*

    Changed files

    • libavformat/rtpdec_latm.c
  4. Change #266159

    Category ffmpeg
    Changed by depthfirst-dev[bot] <1012587+depthfirst-dev[bot]ohnoyoudont@users.noreply.github.com>
    Changed at Sun 03 May 2026 14:43:05
    Repository https://git.ffmpeg.org/ffmpeg.git
    Project ffmpeg
    Branch master
    Revision 1a00ea51cbaf3967718ee0ceeb51a127d42bd249

    Comments

    avformat/rtsp: Fix out-of-bounds read in SDP parser when control_url is empty
    Guard against empty string before reading the last byte in control_url.
    When parsing relative a=control: paths, if no base control URL was set,
    the code would access control_url[strlen(control_url)-1] which on an
    empty string causes a size_t underflow and out-of-bounds read.
    
    Now compute the length first and check for len == 0 before array access.
    
    *Vulnerability reported by Zhenpeng (Leo) Lin at depthfirst*
    *Patch validated by Zheng Yu at depthfirst*
    
    Fixes: DFVULN-611

    Changed files

    • libavformat/rtsp.c
  5. Change #266160

    Category ffmpeg
    Changed by depthfirst-dev[bot] <1012587+depthfirst-dev[bot]ohnoyoudont@users.noreply.github.com>
    Changed at Sun 03 May 2026 14:43:21
    Repository https://git.ffmpeg.org/ffmpeg.git
    Project ffmpeg
    Branch master
    Revision 52b78cd3fe411662b1db06e63c17b5d1399155ee

    Comments

    avformat/rtmpproto: validate compressed SWF header length
    Reject truncated compressed SWF input before attempting to read the
    8-byte header in rtmp_calc_swfhash().
    
    Compressed SWF data identified by the "CWS" signature must be at least
    8 bytes long to contain the fixed header. Bail out early when the input
    is shorter to avoid operating on malformed data.
    
    *Vulnerability reported by Zhenpeng (Leo) Lin at depthfirst*
    *Patch validated by Zheng Yu at depthfirst*
    
    Fixes: DFVULN-612

    Changed files

    • libavformat/rtmpproto.c