{"schema_version":"1.7.2","id":"OESA-2024-1808","modified":"2024-07-05T11:08:26Z","published":"2024-07-05T11:08:26Z","upstream":["CVE-2021-38171","CVE-2022-3109","CVE-2023-50010","CVE-2023-51793"],"summary":"ffmpeg security update","details":"FFmpeg is a complete and free Internet live audio and video broadcasting solution for Linux/Unix. It also includes a digital VCR. It can encode in real time in many formats including MPEG1 audio and video, MPEG4, h263, ac3, asf, avi, real, mjpeg, and flash.\r\n\r\nSecurity Fix(es):\r\n\r\nadts_decode_extradata in libavformat/adtsenc.c in FFmpeg 4.4 does not check the init_get_bits return value, which is a necessary step because the second argument to init_get_bits can be crafted.(CVE-2021-38171)\r\n\r\nAn issue was discovered in the FFmpeg package, where vp3_decode_frame in libavcodec/vp3.c lacks check of the return value of av_malloc() and will cause a null pointer dereference, impacting availability.(CVE-2022-3109)\r\n\r\nBuffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the set_encoder_id function in /fftools/ffmpeg_enc.c component.(CVE-2023-50010)\r\n\r\nBuffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavutil/imgutils.c:353:9 in image_copy_plane.(CVE-2023-51793)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP3","name":"ffmpeg","purl":"pkg:rpm/openEuler/ffmpeg\u0026distro=openEuler-22.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.2.4-12.oe2203sp3"}]}],"ecosystem_specific":{"aarch64":["ffmpeg-4.2.4-12.oe2203sp3.aarch64.rpm","ffmpeg-debuginfo-4.2.4-12.oe2203sp3.aarch64.rpm","ffmpeg-debugsource-4.2.4-12.oe2203sp3.aarch64.rpm","ffmpeg-devel-4.2.4-12.oe2203sp3.aarch64.rpm","ffmpeg-libs-4.2.4-12.oe2203sp3.aarch64.rpm","libavdevice-4.2.4-12.oe2203sp3.aarch64.rpm"],"src":["ffmpeg-4.2.4-12.oe2203sp3.src.rpm"],"x86_64":["ffmpeg-4.2.4-12.oe2203sp3.x86_64.rpm","ffmpeg-debuginfo-4.2.4-12.oe2203sp3.x86_64.rpm","ffmpeg-debugsource-4.2.4-12.oe2203sp3.x86_64.rpm","ffmpeg-devel-4.2.4-12.oe2203sp3.x86_64.rpm","ffmpeg-libs-4.2.4-12.oe2203sp3.x86_64.rpm","libavdevice-4.2.4-12.oe2203sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1808"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-38171"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3109"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-50010"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51793"}],"database_specific":{"severity":"Critical"}}